2015
DOI: 10.1007/s10623-015-0146-7
|View full text |Cite
|
Sign up to set email alerts
|

Recent progress on the elliptic curve discrete logarithm problem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
34
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 94 publications
(40 citation statements)
references
References 94 publications
1
34
0
Order By: Relevance
“…Then the secret key Sni of node ni is selected from [0,m1], and the corresponding public key is computed by Pni=αSni. This is reasonable according to Discrete Logarithm Difficulty [17,18], given α and Pni, and no algorithm can compute Sni in the expected polynomial time. Further, to defend against the joining of parasitic nodes, each node in the network must have the ability to verify the legality of other nodes.…”
Section: All-direction Random Routing Algorithmmentioning
confidence: 99%
“…Then the secret key Sni of node ni is selected from [0,m1], and the corresponding public key is computed by Pni=αSni. This is reasonable according to Discrete Logarithm Difficulty [17,18], given α and Pni, and no algorithm can compute Sni in the expected polynomial time. Further, to defend against the joining of parasitic nodes, each node in the network must have the ability to verify the legality of other nodes.…”
Section: All-direction Random Routing Algorithmmentioning
confidence: 99%
“…A digital signature is considered to be additional information to the message [1] and it can prevent cheating legitimate users, including forging the sender's signature by the receiver, and repudiating the signature by the sender [2]. There are lots of classical digital signature schemes [3][4][5] including post-quantum signature [6], whose security depends on complex algorithms or unresolved mathematical problems, such as the discrete logarithm problem [7] and the prime factorization problem [8]. However, with the advent of quantum computing and quantum algorithms [9,10], these classical signature schemes are likely to be compromised [11,12].…”
Section: Introductionmentioning
confidence: 99%
“…The attack uses a theorem for elliptic curve. The idea behind the attack is completely new and is of a completely different genre from the existing ones [1,[3][4][5]. In comparison to xedni calculus, our algorithm is fairly straightforward to understand, implement and is better than the exhaustive search.…”
Section: Introductionmentioning
confidence: 99%