Journal of Software Engineering and Applications

Volume 5, Issue 2 (February 2012)

ISSN Print: 1945-3116   ISSN Online: 1945-3124

Google-based Impact Factor: 1.22  Citations  h5-index & Ranking

Combining Public Key Encryption with Schnorr Digital Signature

HTML  Download Download as PDF (Size: 158KB)  PP. 102-108  
DOI: 10.4236/jsea.2012.52016    9,037 Downloads   14,637 Views  Citations
Author(s)

ABSTRACT

This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life. The purpose of the study is to combine the public key encryption with Schnorr digital signature in order to obtain less computational and communicational costs. Signcryption primitive is a better approach then Encrypt-then-Sign or Sign-then-Encrypt methods regarding the costs. All these algorithms offer the possibility to transmit a message over an insecure channel providing both authenticity and confidentiality.

Share and Cite:

L. Savu, "Combining Public Key Encryption with Schnorr Digital Signature," Journal of Software Engineering and Applications, Vol. 5 No. 2, 2012, pp. 102-108. doi: 10.4236/jsea.2012.52016.

Cited by

[1] NGHIÊN CỨU PHÁT TRIỂN MỘT SỐ LƯỢC ĐỒ CHỮ KÝ SỐ MÙ, CHỮ KÝ SỐ TẬP THỂ MÙ DỰA TRÊN CÁC CHUẨN CHỮ KÝ SỐ
2020
[2] Efficient signcryption scheme based on El-Gamal and Schnorr
Multimedia Tools and Applications, 2018
[3] Simulation of a 3-φ, 4-Level Inverter with a Discrete 3-φ PWM Generator for the Suppression of the Harmonics
2016
[4] Implementasi Sistem Pengamanan E-Commerce menggunakan Schnorr Digital Signature
Legacy, 2015
[5] Implementation of Schnorr Signcryption Algorithm on DSP
2015
[6] Implementation, Comparison, and Enhancement of Secure Communication Designs
Procedia Computer Science, 2014
[7] A Novel Signcryption Scheme Based on ECC with Public Verifi-cation and Encrypted Message Authentication
2014
[8] Signcryption Scheme that Utilizes Elliptic Curve for both Encryption and Signature Generation
International Journal of Computer Applications, 2013
[9] پروتکل جدید در پرداخت سیار با استفاده از رمز-امضا و خم بیضوی‎
2013
[10] A New M-Payment Protocol Using Sign-Cryption & Elliptic Curve Cryptography
پدافند الکترونيکي و سايبري, 2013
[11] MỘT BIẾN THỂ CỦA LƯỢC ĐỒ CHỮ KÝ SCHNORR XÂY DỰNG TRÊN BÀI TOÁN LOGARIT RỜI RẠC KẾT HỢP KHAI CĂN TRÊN Z p

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.