An Efficient Signcryption Scheme for Secure Authentication using Hyper Elliptic Curve Cryptography and Keccak Hashing
Vani Rajasekar1, J. Premalatha2, K. Sathya3

1Vani Rajasekar*, Dept of CSE, Kongu engineering college, Perundurai, Erode, India.
2Dr.J.Premalatha, Dept of IT, Kongu engineering college, Perundurai, Erode, India.
3K.Sathya, Dept of CT/UG, Kongu engineering college, Perundurai, Erode, India. 

Manuscript received on 2 August 2019. | Revised Manuscript received on 8 August 2019. | Manuscript published on 30 September 2019. | PP: 1593-1598 | Volume-8 Issue-3 September 2019 | Retrieval Number: C4420098319/2019©BEIESP | DOI: 10.35940/ijrte.C4420.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The need for security is a challenging task nowadays due to the transition from wired to wireless networks, emergence of Internet of Things (IoT), Mobile Networks, Wireless Sensor Networks (WSN) and Radio Frequency Identification System (RFID). Generally wireless systems are prone to insecurity and resource (power) constraint, to deal with these challenges many solutions has been proposed in cryptography. One such important development is light weight cryptography particularly signcryption.Signcryption is a logical combination of digital signature and encryption in a single step therefore the cost of communication and computation is very less compared to the existing signature then encryption scheme. Till date many signcryption techniques were raised based on El-Gamal, RSA and Elliptic Curve Cryptography (ECC). The proposed research work highlights the limitations of existing signcryption based on ECC and it proposes the efficient light weight cryptographic scheme of signcryption based on Hyper Elliptic Curve Cryptography (HECC) and Keccak hashing. Further the proposed research work achieves all the security metrics such as confidentiality, integrity, non- repudiation, forward secrecy and public verifiability.
Keywords: Signcryption, ECC, HECC, Keccak Hashing, Authentication, Forward Secrecy.

Scope of the Article:
Energy Efficient Building Technology