2009 International Conference on Information Technology and Computer Science 2009
DOI: 10.1109/itcs.2009.273
View full text |Buy / Rent full text
Sign up to set email alerts

Abstract: The signcryption scheme presented by Zheng uses hash function and symmetrical cipher to encrypt message. The first protocol for threshold generation of Zheng's signcryption scheme couldn't support multiple public verifiers. In this paper, we proposed a new signcryption scheme based on EC-ELGamal type encryption. Message to be transmitted is embedded in Elliptic Curve as a point P(m) and encrypted by point addition which is efficient and secure as well as exiting schemes. By using verifiable secret sharing and … Show more

Help me understand this report

This publication either has no citations yet, or we are still processing them

Set email alert for when this publication receives citations?

See others like this or search for similar articles