Abstract:Elliptic Curve Cryptography recently gained a lot of attention in industry. The principal attraction of ECC compared to RSA is that it offers equal security for a smaller key size. The present paper includes the study of two elliptic curve E E E − = ∪ . We also illustrate the coding of points over E, secret key exchange and encryption/decryption methods based on above said elliptic curve. Since our proposed schemes are based on elliptic curve of the particular type, therefore the proposed schemes provides a hi… Show more
“…Mathematical concept on elliptic curve is existing on the various literatures [6][7][8][9][10]. A easier and simple mathematically concept on elliptic curves is given by the following [1]:…”
Section: Mathematical Background Of Eccmentioning
confidence: 99%
“…In the year 2001, Firstly Rivest et al [1] developed a new idea of ring signature and implemented in article "How to leak a secret". The main purpose of ring signature technique is parallel to the group signature scheme but with some changes.…”
The ring signature does hide the member of actually signature in the all possible signer. This technique was introduced by Rivest, Tauman and Shamir in 2001. This paper presents elliptic curve cryptosystem using signcryption algorithm with the anonymity feature. In the present paper, combines ring signature scheme with signcryption method to produce the anonymity feature for the signcryption scheme and discuss the characteristic of the security. Because elliptic curve cryptosystem yields like as small bandwidth requirements, low computation load, and high security and methodology of ring signature gives without revealing the actual signer to all possible signers. Combining the benefits of these two methodology, the result is an efficient anonymous signcryption algorithm and highly secure.
“…Mathematical concept on elliptic curve is existing on the various literatures [6][7][8][9][10]. A easier and simple mathematically concept on elliptic curves is given by the following [1]:…”
Section: Mathematical Background Of Eccmentioning
confidence: 99%
“…In the year 2001, Firstly Rivest et al [1] developed a new idea of ring signature and implemented in article "How to leak a secret". The main purpose of ring signature technique is parallel to the group signature scheme but with some changes.…”
The ring signature does hide the member of actually signature in the all possible signer. This technique was introduced by Rivest, Tauman and Shamir in 2001. This paper presents elliptic curve cryptosystem using signcryption algorithm with the anonymity feature. In the present paper, combines ring signature scheme with signcryption method to produce the anonymity feature for the signcryption scheme and discuss the characteristic of the security. Because elliptic curve cryptosystem yields like as small bandwidth requirements, low computation load, and high security and methodology of ring signature gives without revealing the actual signer to all possible signers. Combining the benefits of these two methodology, the result is an efficient anonymous signcryption algorithm and highly secure.
“…In this section first we discuss some essential arithmetic of elliptic curves (which are necessary to understand the proposed scheme). Although a lot of literature exist on arithmetic of elliptic curves [15], a simple and easier arithmetic of elliptic curves is given by the following [16]: An elliptic curve E(F p ) over a finite field F p is defined by the parameters a, b ∈ F p (a and b satisfy the relation 4a 3 + 27b 2 = 0 ), consists of the set of points (x, y) ∈ F p , satisfying the equation y 2 = x 3 + ax + b . The set of points on E(F p ) also include a point O, which is the point at infinity serve as the identity element under addition.…”
Signcryption schemes are compact and specially suited for efficiency-critical applications such as smart card dependent systems. Several researchers have performed a large number of significant applications of signcryption such as authenticated key recovery and key establishment in one mall data packet, secure ATM networks as well as light weight electronic transaction protocols and multi-casting over the internet. In this paper we have proposed an efficient and efficient scheme of signcryption symmetric key solutions, using elliptic curves by reducing senders computational cost. It needs two elliptic curve point multiplication for sender and comparative study of computational cost for sender and recipient as well as there is no any inverse computation for sender and recipient. This makes it more crucial than others.
“…One of the earliest asymmetric cryptosystems is the famous RSA. Later on, many more asymmetric algorithms were introduced, such as ElGamal and ECC [2,3], which were based on the complexity of the integer factorization problem. It was further modified by different cryptologists in [4][5][6].…”
The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. In this respect, novel asymmetric cryptosystems based on matrices over residue rings are in practice. In this article, a novel approach is introduced. Despite the matrix algebra M(k,ℤn), the matrix algebra M(k,Rn′), Rn′ = ℤ2[w]⟨wn−1⟩ as the chain ring is considered. In this technique, instead of exponentiation, the inner product automorphisms the use for key generation. The chain ring provides computational complexity to its algorithm, which improves the strength of the cryptosystem. However, the residue ring endangers the security of the original cryptosystem, while it is hard to break using Rn′. The structure of the chain ring deals with the binary field ℤ2, which simplifies its calculation and makes it capable of efficient execution in various applications.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.