Author
Listed:
- Insaf Ullah
(Information Technology Department, Hazra University, Mansehra 21120, Pakistan
HIET, Hamdard University Karachi, Islamabad Campuse, Islamabad 44000, Pakistan)
- Noor Ul Amin
(Information Technology Department, Hazra University, Mansehra 21120, Pakistan)
- Junaid Khan
(Departement of Information Technology, Abbotabad University of Science and Technology, Khyber Pakhtunkhwa 22010, Pakistan)
- Muhammad Rehan
(Departement of Information Technology, Abbotabad University of Science and Technology, Khyber Pakhtunkhwa 22010, Pakistan)
- Muhammad Naeem
(Departement of Information Technology, Abbotabad University of Science and Technology, Khyber Pakhtunkhwa 22010, Pakistan)
- Hizbullah Khattak
(Information Technology Department, Hazra University, Mansehra 21120, Pakistan)
- Shah Jahan Khattak
(Pakistan Engineering Council (PEC), Attatruk Avenue (East) Sector G-5/2, Islamabad 44000, Pakistan)
- Haseen Ali
(Departement of Information Technology, Abbotabad University of Science and Technology, Khyber Pakhtunkhwa 22010, Pakistan)
Abstract
Rivest, Shamir, & Adleman (RSA), bilinear pairing, and elliptic curve are well-known techniques/algorithms for security protocols. These techniques suffer from higher computation and communication costs due to increased sizes of parameters, public keys, and certificates. Hyper-elliptic curve has lower parameter size, public key size, and certificate size. The aim of the proposed work is to reduce the computational cost and communication cost. Furthermore, we validate the security properties of our proposed scheme by using the well-known simulation tool called automated validation of Internet security protocols and applications. Our approach ensures security properties such as resistance against replay attack, confidentiality, authenticity, unforgeability, integrity, non-repudiation, public verifiability, and forward secrecy.
Suggested Citation
Insaf Ullah & Noor Ul Amin & Junaid Khan & Muhammad Rehan & Muhammad Naeem & Hizbullah Khattak & Shah Jahan Khattak & Haseen Ali, 2019.
"A Novel Provable Secured Signcryption Scheme PSSS : A Hyper-Elliptic Curve-Based Approach,"
Mathematics, MDPI, vol. 7(8), pages 1-16, July.
Handle:
RePEc:gam:jmathe:v:7:y:2019:i:8:p:686-:d:253546
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:7:y:2019:i:8:p:686-:d:253546. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.