Effective signcryption approach for secure convention for multilayer consensus using ECC

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

The used algorithm in cryptography represents the facts for compution and/or computation costs in general. The motivation for any problem is primitive generators that makes the protocol a big advantage over the technology augmentation. This manuscript presents a methodological approach on session specific challenge-response protocol for a better, improved and stronger security on reduced costs. The basic primitives are applying on Diffie-Hellman and Elliptic Curve Cryptography. The purpose is proving the security properties for protocol compositional logic that focuses on privacy rights in information assessment in multidisciplinary obligations. In addition, we portrats a signcryption approach for password authenticated key exchange protocol for multilayer consensus, which logically combines individual signature and encryption cost in the form of reduced computational cost and communications cost in single stride of operation. The overall computation time potentially reduces for the proposed methodology on key generation and signature. The results for ECC based multilayer consensus key generation approach are testing on Automated Validation of Internet Security Protocol Architecture (AVISPA) tool and SPAN tool. Further, by preserving the definition of signcryption, we enhanced the same scheme in relations to the other proposed schemes.

References Powered by Scopus

New Directions in Cryptography

10587Citations
N/AReaders
Get full text

On the Security of Public Key Protocols

4333Citations
N/AReaders
Get full text

Elliptic curve cryptosystems

3799Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Kumar, G., & Saini, H. (2016). Effective signcryption approach for secure convention for multilayer consensus using ECC. International Journal of Security and Its Applications, 10(7), 287–306. https://doi.org/10.14257/ijsia.2016.10.7.26

Readers' Seniority

Tooltip

Professor / Associate Prof. 3

60%

PhD / Post grad / Masters / Doc 1

20%

Researcher 1

20%

Readers' Discipline

Tooltip

Computer Science 5

100%

Save time finding and organizing research with Mendeley

Sign up for free