2016
DOI: 10.1371/journal.pone.0161857
|View full text |Cite
|
Sign up to set email alerts
|

Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures

Abstract: Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user’s public key based on the user’s identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of ident… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
26
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(26 citation statements)
references
References 29 publications
0
26
0
Order By: Relevance
“…In this paper, we point out that there is a serious issue with the security and efficiency claims given by Wang et al [35]. In short, their elliptic curves are insecure and should not be used for cryptographic purposes.…”
Section: Introductionmentioning
confidence: 90%
See 3 more Smart Citations
“…In this paper, we point out that there is a serious issue with the security and efficiency claims given by Wang et al [35]. In short, their elliptic curves are insecure and should not be used for cryptographic purposes.…”
Section: Introductionmentioning
confidence: 90%
“…The hardness of finite field discrete logarithm problems is one of the most important bases of security; therefore, their elliptic curves should not be used for cryptographic purposes. In addition, we present security and efficiency analyses of the method of Wang et al [35]. Based on these analyses, we conclude that the claims of security and efficiency given by Wang et al [35] are flawed.…”
Section: Introductionmentioning
confidence: 92%
See 2 more Smart Citations
“…Several ASIC-Based ECC processors have been proposed over the binary fields in the literature [ 10 , 18 , 26 33 ]. ECC can be used for modern practical applications like mobile services [ 34 ], authentication for identity protection for smart grid, wireless sensor and mesh networks [ 35 37 ], biometric-based authentication [ 38 ], identity-based cryptography [ 39 ], and session initiation protocol [ 40 ].…”
Section: Introductionmentioning
confidence: 99%