Volume-03 ISSN: 2455-3085 (Online) Issue-06 RESEARCH REVIEW International Journal of Multidisciplinary June-2018 www.rrjournals.com [UGC Listed Journal] © RRIJM 2015, All Rights Reserved 381 | P age Mechanism of Signcryption A Review * Anuj Kumar Singh Assistant Professor, Amity University, Haryana, Gurgaon (India) ARTICLE DETAILS ABSTRACT Article History Published Online: 16 June 2018 Signcryption is a relatively new way to achieve confidentiality and authentication simultaneously. Before the advent of signcryption the approach was to first encrypt and then to sign the message, but this scheme had more computational cost and communication overhead. Many signcryption schemes have been developed and implemented so far, but differ in security attributes they provide and computational cost they incur. This paper explains the mechanism of signcryption and analyzes the different cryptographic approaches which can be used along with signcryption. It also provides a glimpse of different signcryption schemes proposed. Keywords Signcryption, Mechanism, Review * Corresponding Author Email: anujbtechcs[at]gmail.com 1. Introduction The technique of Signcryption was introduced by Yuliang Zheng [1] in 1997. Signcryption is relatively a new cryptographic system which combines encryption and authentication in only one logical step. Zheng claimed that signcryption incurs 58% less computational cost and 85% less overhead in comparison to the conventional signature-then-encryption approach. Since the inception of signcryption many signcryption schemes have been given by the authors throughout the years offering different security attributes while having certain advantages and limitations. Also these signcryption schemes are based on DLP (Discrete Logarithmic Problem), ECDLP (Elliptic Curve Discrete Logarithmic Problem) or BDHP (Bilinear Diffie Hellman Problem). The mechanism of signcryption has been explained in the upcoming section of the paper. 2. Mechanism of Signcryption Signcryption mechanism has three phases namely Initialization Phase, Signcryption Phase and Un-signcryption phase [1]. a) Initialization Phase is intended to select global public parameters used by Alice (Sender) and the Bob (Receiver). The key pair for Alice and Bob is also chosen in this phase. The steps carried out are shown in Figure 1. b) Signcryption Phase enables sender Alice to send the signcrypted message to the recipient Bob. Alice selects a random integer x in the range [1, q-1]. The key k is generated and divided into two subkeys k1 and k2 of equal length, used in subsequent operations. The computations performed are shown in Figure 2. Alice sends signcrypted message (c,r,s) to Bob. c) Un-signcryption Phase - After receiving the signcrypted message (c,r,s) Bob computes the key k and divides it into two subkeys k1 and k2 of equal length. The computations are shown in Figure 3. In this way using signcryption encryption and authentication are performed in only one logical step. Figure 1: Steps in Initialization Phase Figure 2: Computations Performed in Signcryption Phase