Main Reference PaperImplementing Signcryption algorithm, 2011.
  • Elliptic curve Digital Signature Standard is based on the signcryption. Identity based signcryption scheme notions of ring signcryptionand proxy signcryption will be created. Elliptic curve cryptography (ECC) is relatively new technology compared to other public key cryptography such as RSA. Elliptic key operates on smaller key size. A 160-bit key in ECC is considered to be as secured as a 1024 bit key in RSA.

+ Description
  • Elliptic curve Digital Signature Standard is based on the signcryption. Identity based signcryption scheme notions of ring signcryptionand proxy signcryption will be created. Elliptic curve cryptography (ECC) is relatively new technology compared to other public key cryptography such as RSA. Elliptic key operates on smaller key size. A 160-bit key in ECC is considered to be as secured as a 1024 bit key in RSA.

  • Signcryption algorithm provides Confidentiality, Unforgeability, Integrity, and Non-repudiation.

  • Signcryption schemes provide further attributes such as Public verifiability and Forward secrecy of message confidentiality

+ Aim & Objectives
  • Signcryption algorithm provides Confidentiality, Unforgeability, Integrity, and Non-repudiation.

  • Signcryption schemes provide further attributes such as Public verifiability and Forward secrecy of message confidentiality

  • The Batch auditing where multiple delegated auditing tasks from the client can be performed simultaneously by the TPA.

+ Contribution
  • The Batch auditing where multiple delegated auditing tasks from the client can be performed simultaneously by the TPA.

  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.