{"title":"一种有效的基于椭圆曲线的防火墙签名加密方案","authors":"Waseem Iqbal, M. Afzal, Farhan Ahmad","doi":"10.1109/NCIA.2013.6725326","DOIUrl":null,"url":null,"abstract":"In this paper, a modified digital signcryption model has been proposed keeping in view the requirements of firewall signcryption. Based on this model, the security and efficiency of existing signcryption schemes that are presented over the years have been analyzed. The analysis shows that these schemes lack certain security attributes and violate the basic principles of firewall signcryption. Furthermore, a new signcryption scheme has been proposed that provides all essential security attributes and complies with all the requirements of firewall signcryption. The proposed scheme also has computational advantages over existing schemes. Since the construction of the proposed scheme is based on elliptic curve cryptography, it is also suitable for resource constrained applications.","PeriodicalId":222016,"journal":{"name":"2013 2nd National Conference on Information Assurance (NCIA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"An efficient elliptic curve based signcryption scheme for firewalls\",\"authors\":\"Waseem Iqbal, M. Afzal, Farhan Ahmad\",\"doi\":\"10.1109/NCIA.2013.6725326\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, a modified digital signcryption model has been proposed keeping in view the requirements of firewall signcryption. Based on this model, the security and efficiency of existing signcryption schemes that are presented over the years have been analyzed. The analysis shows that these schemes lack certain security attributes and violate the basic principles of firewall signcryption. Furthermore, a new signcryption scheme has been proposed that provides all essential security attributes and complies with all the requirements of firewall signcryption. The proposed scheme also has computational advantages over existing schemes. Since the construction of the proposed scheme is based on elliptic curve cryptography, it is also suitable for resource constrained applications.\",\"PeriodicalId\":222016,\"journal\":{\"name\":\"2013 2nd National Conference on Information Assurance (NCIA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 2nd National Conference on Information Assurance (NCIA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCIA.2013.6725326\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 2nd National Conference on Information Assurance (NCIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCIA.2013.6725326","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An efficient elliptic curve based signcryption scheme for firewalls
In this paper, a modified digital signcryption model has been proposed keeping in view the requirements of firewall signcryption. Based on this model, the security and efficiency of existing signcryption schemes that are presented over the years have been analyzed. The analysis shows that these schemes lack certain security attributes and violate the basic principles of firewall signcryption. Furthermore, a new signcryption scheme has been proposed that provides all essential security attributes and complies with all the requirements of firewall signcryption. The proposed scheme also has computational advantages over existing schemes. Since the construction of the proposed scheme is based on elliptic curve cryptography, it is also suitable for resource constrained applications.