The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016
DOI: 10.4236/am.2016.73027
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Schemes Based on Elliptic Curves over the Ring Zp[i]

Abstract: Elliptic Curve Cryptography recently gained a lot of attention in industry. The principal attraction of ECC compared to RSA is that it offers equal security for a smaller key size. The present paper includes the study of two elliptic curve E E E − = ∪ . We also illustrate the coding of points over E, secret key exchange and encryption/decryption methods based on above said elliptic curve. Since our proposed schemes are based on elliptic curve of the particular type, therefore the proposed schemes provides a hi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Mathematical concept on elliptic curve is existing on the various literatures [6][7][8][9][10]. A easier and simple mathematically concept on elliptic curves is given by the following [1]:…”
Section: Mathematical Background Of Eccmentioning
confidence: 99%
See 1 more Smart Citation
“…Mathematical concept on elliptic curve is existing on the various literatures [6][7][8][9][10]. A easier and simple mathematically concept on elliptic curves is given by the following [1]:…”
Section: Mathematical Background Of Eccmentioning
confidence: 99%
“…In the year 2001, Firstly Rivest et al [1] developed a new idea of ring signature and implemented in article "How to leak a secret". The main purpose of ring signature technique is parallel to the group signature scheme but with some changes.…”
Section: Introductionmentioning
confidence: 99%
“…In this section first we discuss some essential arithmetic of elliptic curves (which are necessary to understand the proposed scheme). Although a lot of literature exist on arithmetic of elliptic curves [15], a simple and easier arithmetic of elliptic curves is given by the following [16]: An elliptic curve E(F p ) over a finite field F p is defined by the parameters a, b ∈ F p (a and b satisfy the relation 4a 3 + 27b 2 = 0 ), consists of the set of points (x, y) ∈ F p , satisfying the equation y 2 = x 3 + ax + b . The set of points on E(F p ) also include a point O, which is the point at infinity serve as the identity element under addition.…”
Section: Mathematical Background Of Eccmentioning
confidence: 99%
“…One of the earliest asymmetric cryptosystems is the famous RSA. Later on, many more asymmetric algorithms were introduced, such as ElGamal and ECC [2,3], which were based on the complexity of the integer factorization problem. It was further modified by different cryptologists in [4][5][6].…”
Section: Introductionmentioning
confidence: 99%