Abstract—Mobile commerce is becoming common nowadays as it looks more convenient for a user to pay through their mobile phones rather than other electronic payment systems and it reduces frauds in electronic payments. This paper describes the performance analysis of sign then encryption and encryption then sign of the messages on joint signature scheme. Asymmetric encryption/decryption is applied along with signature generation and verification to make it secure and to authenticate user. This paper tells which method cryptsign or signcrypt is better by measuring its performance and memory consumption. Experimental results shows that signcrypt take lesser time and memory consumption as compared to cryptsign technique.we conclude that signcrypt as compared to cryptsign technique is better on joint signature scheme.
Index Terms—Cryptsign, decryption, encryption, signcrypt, signature generation, signature verification.
Salma Shahid Kkayani is the student of Software Engineering in Fatima Jinnah Women University (E-mail: email@example.com)
Malik Sikandar Hayat Khiyal is the chairperson in the Department of Computer Science and Software Engineering, Fatima Jinnah Women University (E-mail: firstname.lastname@example.org)
Aihab Khan is Assistant Professor in the Department of Computing and Technology, Iqra University, Islamabad, Pakistan (E-mail: email@example.com) .
Cite: Salma Shahid Kayani, Malik Sikandar Hayat Khiyal, and Aihab Khan, "Performance Analysis of Signcrypt and Cryptsign on Joint Signatures," International Journal of Computer Theory and Engineering vol. 3, no. 5, pp. 681-683, 2011.