2021
DOI: 10.1016/j.jksuci.2018.02.004
|View full text |Cite
|
Sign up to set email alerts
|

A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…PSNR and MSE have been applied for determining the image nature. An effective signcryption concept is developed in [8] interms of negativity of RSA presumption and discrete logarithm problem on conic bends across a ring Zn. The traditional method ensures a forward mystery where a sender's mystery keys are not covered and under ciphertext verification by an external component without computing decryption.…”
Section: Introductionmentioning
confidence: 99%
“…PSNR and MSE have been applied for determining the image nature. An effective signcryption concept is developed in [8] interms of negativity of RSA presumption and discrete logarithm problem on conic bends across a ring Zn. The traditional method ensures a forward mystery where a sender's mystery keys are not covered and under ciphertext verification by an external component without computing decryption.…”
Section: Introductionmentioning
confidence: 99%
“…Let us suppose that 2 people A and B wish to communicate: -KeyGen allows to generate a pair of keys (SDKA, VEKA) and (SDKB, VEKB) where VEKA, VEKB are public and SDKA, SDKB are private -SigEnc (SDKA, VEKB) for sign encrypt the message -VerDec (VEKA, SDKB) to de-sign the message. Multiple implementations can be as per the algorithms in [5,11]. The implementation used is the one in [4].…”
Section: 3mentioning
confidence: 99%
“…For overcoming this issue, other works exploited parameterization of the Pell hyperbola, obtaining RSA-like schemes having a two times faster decryption procedure than RSA [1,16,17]. Moreover, recently, several works have exploited these schemes in different contexts [2,3,19,21].…”
Section: Introductionmentioning
confidence: 99%