کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
487662 | 703589 | 2014 | 7 صفحه PDF | دانلود رایگان |

Cryptography offers effective techniques to ensure users’ security and privacy in an efficient way. To protect networks from intruders/attackers and transmit a message over an insecure channel, encryption and digital signature algorithms could be used within different designs to provide secure networks and security solutions in order to protect users’ information and their data from being attacked. These designs would ensure confidentiality, authenticity, integrity, and non-repudiation. Signcryption algorithms achieve the properties of both digital signature and encryption schemes. In this paper, we implement the Schnorr Signcryption and RSA Encrypt-Sign-Encrypt (Sign-Encrypt-Sign) schemes. Moreover, we will illustrate the comparison between the RSA Encrypt-Sign-Encrypt and Schnorr Signcryption schemes in terms of computation cost. Additionally, we will present an improvement factor in the case of parallelisation techniques applied to Schnorr Signcryption and RSA Encrypt-Sign-Encrypt (Sign-Encrypt-Sign) schemes.
Journal: Procedia Computer Science - Volume 37, 2014, Pages 363-369