@article{858, author = {Laura Savu}, title = {Schnorr Digital Signature in Signcryption Scheme}, journal = {Journal of Information Security Research}, year = {2012}, volume = {3}, number = {2}, doi = {}, url = {http://www.dline.info/jisr/fulltext/v3n2/2.pdf}, abstract = {This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life. The purpose of the study is to combine the public key encryption with Schnor digital signature in order to obtain less computational and communicational costs. Signcryption primitive is a better approach then Encrypt-then-Sign or Signthen- Encrypt methods regarding the costs. All these algorithms offer the possibility to transmit a message over an insecure channel providing both authenticity and confidentiality.}, }