How to construct efficient signcryption schemes on elliptic curves

被引:152
作者
Zheng, YL [1 ]
Imai, H
机构
[1] Monash Univ, Sch Comp & Informat Technol, Melbourne, Vic 3199, Australia
[2] Univ Tokyo, Inst Ind Sci, Minato Ku, Tokyo 106, Japan
关键词
cryptography; digital signature; elliptic curves; encryption; public key cryptography; signcryption;
D O I
10.1016/S0020-0190(98)00167-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signcryption is a new paradigm in public key cryptography. A remarkable property of a signcryption scheme is that it fulfills both the functions of public key encryption and digital signature, with a cost significantly smaller than that required by signature-then-encryption. The purposes of this paper are to demonstrate how to specify signcryption schemes on elliptic curves over finite fields, and to examine the efficiency of such schemes. Our analysis shows that when compared with signature then-encryption on elliptic curves, signcryption on the curves represents a 58% saving in computational cost and a 40% saving in communication overhead. (C) 1998 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:227 / 233
页数:7
相关论文
共 18 条
[1]  
Araki K., 1998, Public Key Cryptography. First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98. Proceedings, P29, DOI 10.1007/BFb0054012
[2]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[3]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[4]  
GAMAGE C, 1997, UNPUB BLOCK BASED AP
[5]  
Hanaoka G., 1998, Information Security and Privacy. Third Australasian Conference, ACISP'98. Proceedings, P215, DOI 10.1007/BFb0053735
[6]  
*IEEE, 1998, STAND SPEC PUBL KEY
[7]  
Matsuura K, 1998, LECT NOTES COMPUT SC, V1368, P190
[8]   REDUCING ELLIPTIC CURVE LOGARITHMS TO LOGARITHMS IN A FINITE-FIELD [J].
MENEZES, AJ ;
OKAMOTO, T ;
VANSTONE, SA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (05) :1639-1646
[9]  
Menezes AJ., 1997, HDB APPL CRYPTOGRAPH
[10]  
*NAT I STAND TECHN, 1994, FED INF PROC STAND P, V186