Skip to main content

Signcryption Using ECDSA and Paillier Cryptosystem

  • Conference paper
  • First Online:
ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management (ICICCT 2019)

Abstract

A new signcryption scheme is proposed that performs efficient and secure encryption along with signature for verification. Encryption is done with Paillier Cryptosystem and ECDSA is used for signature verification. Elliptic curve digital signature is used for digital signature generation and verificatation where the security of the algorithm is dependent on elliptic curve discrete logarithm problem. A new Elliptic curve digital signature with Paillier cryptosystem is proposed. The Paillier cryptosystem is asymmetric key algorithm where the security of the algorithm lies in the computationally difficulty involved in solving \(n^{th}\) residue classes. The security of the scheme is based on both composite residuosity and elliptic curve discrete logarithm problem. Correctness of the scheme is verified for real time implementation and security of the scheme is verified semantically.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kalbhor, S., Gaikwad, A., Bhise, K., Salunke, D., Bangar, V.: A survey on digital signature

    Google Scholar 

  2. Kumar, M.H., Singh, D.A.: An efficient implementation of digital signature algorithm with SRNN public key cryptography. IJRREST Int. J. Res. Rev. Eng. Sci. Technol. (2012)

    Google Scholar 

  3. Lauter, K.E., Stange, K.E.: The elliptic curve discrete logarithm problem and equivalent hard problems for elliptic divisibility sequences. In: International Workshop on Selected Areas in Cryptography. Springer (2008)

    Google Scholar 

  4. McCurley, K.S.: The discrete logarithm problem. In: Cryptology and Computational Number Theory (1990)

    Google Scholar 

  5. Adachi, T.: Composite residuosity and its application to cryptography (2012)

    Google Scholar 

  6. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985). A public key cryptosystem and a signature scheme based on discrete logarithms

    Article  MathSciNet  Google Scholar 

  7. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  8. Patarin, J., Goubin, L.: Trapdoor one-way permutations and multivariate polynomials. In: International Conference on Information and Communications Security. Springer (1997)

    Google Scholar 

  9. Feigenbaum, J.: Locally random reductions in interactive complexity theory. In: Advances in Computational Complexity Theory (1990)

    Google Scholar 

  10. Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1, 36–63 (2001)

    Article  Google Scholar 

  11. Khalique, A., Singh, K., Sood, S.: Implementation of elliptic curve digital signature algorithm. Int. J. Comput. Appl. 2, 21–27 (2010). 244 5 th Avenue,# 1526, New York, NY 10001, USA India

    Google Scholar 

  12. Paillier, P., et al.: Public-key cryptosystems based on composite degree residuosity classes. Springer (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rolla Subrahmanyam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Subrahmanyam, R., Rao, Y.V.S., Rekha, N.R. (2020). Signcryption Using ECDSA and Paillier Cryptosystem. In: Gunjan, V., Garcia Diaz, V., Cardona, M., Solanki, V., Sunitha, K. (eds) ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management. ICICCT 2019. Springer, Singapore. https://doi.org/10.1007/978-981-13-8461-5_70

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-8461-5_70

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-8460-8

  • Online ISBN: 978-981-13-8461-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics