Path: Top -> Journal -> Jurnal Internasional -> King Saud University -> 2021 -> Volume 33, Issue 1, January
A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography
Oleh : Renu Mary Daniel, Elijah Blessing Rajsingh, Salaja Silas, King Saud University
Dibuat : 2021-08-24, dengan 0 file
Keyword : Signcryption, Conic curve cryptography, Forward secrecy, Ciphertext authentication, E-commerce, ProVerif
Url : http://www.sciencedirect.com/science/article/pii/S1319157817304081
Sumber pengambilan dokumen : Web
Signcryption is an authenticated encryption technique that concurrently establishes message confidentiality, authenticity, integrity and non-repudiation. In this paper, we propose an efficient signcryption scheme, based on the hardness of RSA assumption and discrete logarithm problem on conic curves over a ring . The protocol ensures forward secrecy, in case the senders secret keys are exposed and supports ciphertext authentication by an external entity, without full decryption. The protocol remains secure, as long as, either one of the hardness assumptions hold. The scheme is implemented over conic curves, which facilitates effective message encoding and decoding, as well as, efficient point operations and inverses. Conic-based RSA assumption offers resistance to low public key and low private key exponent attacks, prevalent in the original RSA cryptosystem. The proposed protocol is used to design a Business to Customer (B2C) e-commerce system, with security against replay attacks, man-in-the-middle attacks, impersonation attacks, server spoofing and double spending. The protocol is validated using automated cryptographic verification tool ProVerif.
Deskripsi Alternatif :Signcryption is an authenticated encryption technique that concurrently establishes message confidentiality, authenticity, integrity and non-repudiation. In this paper, we propose an efficient signcryption scheme, based on the hardness of RSA assumption and discrete logarithm problem on conic curves over a ring . The protocol ensures forward secrecy, in case the senders secret keys are exposed and supports ciphertext authentication by an external entity, without full decryption. The protocol remains secure, as long as, either one of the hardness assumptions hold. The scheme is implemented over conic curves, which facilitates effective message encoding and decoding, as well as, efficient point operations and inverses. Conic-based RSA assumption offers resistance to low public key and low private key exponent attacks, prevalent in the original RSA cryptosystem. The proposed protocol is used to design a Business to Customer (B2C) e-commerce system, with security against replay attacks, man-in-the-middle attacks, impersonation attacks, server spoofing and double spending. The protocol is validated using automated cryptographic verification tool ProVerif.
Beri Komentar ?#(0) | Bookmark
Properti | Nilai Properti |
---|---|
ID Publisher | gdlhub |
Organisasi | King Saud University |
Nama Kontak | Herti Yani, S.Kom |
Alamat | Jln. Jenderal Sudirman |
Kota | Jambi |
Daerah | Jambi |
Negara | Indonesia |
Telepon | 0741-35095 |
Fax | 0741-35093 |
E-mail Administrator | elibrarystikom@gmail.com |
E-mail CKO | elibrarystikom@gmail.com |
Print ...
Kontributor...
- Editor: Calvin