2018
DOI: 10.1002/dac.3763
|View full text |Cite
|
Sign up to set email alerts
|

Provable secure lightweight hyper elliptic curve‐based communication system for wireless sensor networks

Abstract: It is widely believed that hyper elliptic curve cryptosystems (HECCs) are not attractive for wireless sensor network because of their complexity compared with systems based on lower genera, especially elliptic curves. Our contribution shows that for low cost security applications HECs cryptosystems can outperform elliptic curve cryptosystems. The aim of this paper is to propose a discrete logarithm problem-based lightweight secure communication system using HEC. We propose this for different genus curves over … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
21
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
10

Relationship

2
8

Authors

Journals

citations
Cited by 31 publications
(21 citation statements)
references
References 25 publications
(29 reference statements)
0
21
0
Order By: Relevance
“…The is the compressed form of , which contains fewer key and parameters size [13,14]. Equation 1 represents the of genus ⪰ 2 over a finite field .…”
Section: A Hyper Elliptic Curvementioning
confidence: 99%
“…The is the compressed form of , which contains fewer key and parameters size [13,14]. Equation 1 represents the of genus ⪰ 2 over a finite field .…”
Section: A Hyper Elliptic Curvementioning
confidence: 99%
“…Thus, a new type, the generalization of elliptic curve, called hyperelliptic curve, was proposed [23]. The hyperelliptic curve features security same as that of the elliptic curve, bilinear pairing and RSA; it uses a 80-bit key, identity and certificate size [24], [25]. The hyperelliptic curve is deemed to be a better choice for energy-constrained devices.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, a new form, the generalization of the elliptic curve, called the hyperelliptic curve was thus suggested [ 19 ]. The hyperelliptic curve offers the same degree of protection as the elliptic curve, bilinear pairing, and RSA using 80-bit keys, identity, and certificate size [ 20 , 21 ]. For energy-constrained IoHT devices, the hyperelliptic curve would be a better option.…”
Section: Introductionmentioning
confidence: 99%