Explore chapters and articles related to this topic
A Novel LC-DEH Algorithm to Enhance Efficiency and Security for Reliable Data Transmission in Blockchain with IoT-Based Healthcare Systems
Published in Ambikapathy, R. Shobana, Logavani, Dharmasa, Reinvention of Health Applications with IoT, 2022
G. Uganya, Radhika Baskar, M. Balasaraswathi, N. Vijayaraj, D. Rajalakshmi
Zaru et al. did a general survey on cryptography. This paper discussed how cryptography is used to achieve some of the goals like confidentiality, data integrity, authentication, etc. They concluded that Kerberos is far better than PGP because it is scalable and its scope could be very large [50]. Rajasekar et al. proposed a multifactor signcryption scheme for secure authentication that is achieved by the combination of hyperelliptic curve cryptography and bio-hash function. The proposed method uses multiple-factor authentication to make more secure personal data. They have used signcryption which is a lightweight cryptography method to minimize biometric recognition error, dictionary attack, DoS attack, impersonation attack, and so on [51]. Jyothi et al. analysed cryptography encryption of network security. In this work, they have done a detailed survey to find the best way to secure data. At last, on comparing all the techniques, they found cryptography helps in safeguarding the confidential personal information [52].
Blockchain and Big Data in the Healthcare Sector
Published in Neeraj Kumar, N. Gayathri, Md. Arafatur Rahman, B. Balamurugan, Blockchain, Big Data and Machine Learning, 2020
Yogesh Sharma, B. Balamurugan, Firoz Khan
Huihui Yang (2017) has proposed a blockchain and MedRec-based approach and implemented signcryption and attribute-based authentication that ensure the secure sharing of health records. With the implementation of the approach, the patient can view the complete health record that was scattered earlier in different places. By using MedRec the health record of the patient can be stored securely and kept safe against tampering, whereas with the sign encryption approach the authenticity of the health record of the patient can be verified and allows flexible data sharing.
Cyber Defence and Countermeasures
Published in Stanislav Abaimov, Maurizio Martellini, Cyber Arms, 2020
Stanislav Abaimov, Maurizio Martellini
Interim solutions, e.g., Signcryption, includes combinations of the digital signature and the public key encryption in a single logical step, ensuring authentication and confidentiality simultaneously with a cost lower than signing and encrypting the message independently. The ring signcryption added anonymity through enabling the user to signcrypt a message along with the identities of a set of potential senders, including himself, without revealing which user in the set has actually produced the signcryption.23
Design of Multiple Share Creation with Optimal Signcryption based Secure Biometric Authentication System for Cloud Environment
Published in International Journal of Computers and Applications, 2022
D. Prabhu, S. Vijay Bhanu, S. Suthir
Once the shares are created, the next step is to encrypt them by the use of the signcryption technique. A new approach to public key cryptography has Signcryption, which, at the same time, fulfills the characteristics of a digital signature and open key encryption using minimal cost. The properties contained in signcryption are Unforgeability, Secret, Non-repudiation, and Integrity. Any signcryption has further attributed namely public verifiability and forward confidentiality of message secret. This case has 3 techniques: unsigncryption, signcryption, and key generation method. The message forwarding of the past encoder images was extremely secure through the presented PeSeOA signcryption using optimum key selection. The signcryption signifies a public-key primitive that establishes 2 important cryptographic gadget that can make sure privacy, honesty, and non-repudiation. It concurrently carries out a digital signature and encryption. These initialized processes set the prime numbers and hash function with key [29]. For improving the medicinal image security, the presented approach employs the ideal private keys by an optimized model.
Encryption-based steganography of images by multiobjective whale optimal pixel selection
Published in International Journal of Computers and Applications, 2022
Rajkumar L. Biradar, Vishwanath Burkpalli
Signcryption is a public key cryptosystem which provides adequate security of the secret image by generating digital signature and encryption at the same step itself. The parameters used in the Signcryption process are sender ‘S’, standard parameter ‘cp’, secret key of sender ‘xs’, public key of receiver ‘yr’ and the sender and receiver’s public key ‘ys’, ‘yr’ as ‘binfo’ are the inputs to the Signcryption scheme. The parameter ‘binfo’ is essential for securing Signcryption which consists of strings which uniquely identify sender and receiver or the public keys hash values of both parties [25].
A secure cluster-based authentication and key management protocol for machine-type communication in the LTE network
Published in International Journal of Computers and Applications, 2022
K. Krishna Jyothi, Shilpa Chaudhari
In order to maintain data authentication, signcryption is used. It is a combination of digital signature and encryption. It will perform the function of both encryption and digital signature. Non-repudiation, integrity, and confidentiality can be maintained by using the encryption and digital signature. In public key, the message is digitally signed, after that it is encrypted. But the two problems of this process are the low efficiency and high cost of the process. Thus, the use of signcryption helps to rectify the above two drawbacks, by performing digital signature and encryption method in a single logical step. This will reduce the computational cost as well as it reduces the communicational overhead as compared to the signature-then-encryption method. Instead of a simple encryption method, it is possible to use the hybrid encryption method. A single session key can be used instead of various encryptions, this will improve the overall efficiency as compared to the signcryption. But the use of session key will create a system of security loss than the relatively weak CPA model. Thus, for the hybrid encryption method, the session key is used along with the message. This is used because to improve security. Correspondingly, it is clear that signcryption is the most secure method that is used for encryption. The common property of the syncryption methods are: Efficiency: as compared to the signature-then-encryption method the computational cost is low in signcryption.Correctness: the technique used for the signcryption should be correct and valid.Security: both the encryption and the digital signature security should be maintained in signcryption simultaneously. Integrity, unforgeability, non-repudiation and confidentiality are some of the security that are involved in the signcryption. In addition to the above-mentioned security, the forward secrecy and public verifiability are also maintained in signcryption.