A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
We present a new elliptic curve cryptosystem with fast encryption and key generation, which is provably secure in the standard model. ... Despite the typical bit length of n, our encryption algorithm is faster than El Gamal elliptic curve cryptosystems. ... Thus, our cryptosystem is the provably secure IND-CPA elliptic curve cryptosystem in the standard model with the fastest encryption algorithm to the best of our knowledge. ...doi:10.1007/978-3-540-30556-9_20 fatcat:g65o2ye7bzcvllr4jnfvj5gnla
Summary: “This paper proposes an efficient and provably secure transform to encrypt a message with any asymmetric one-way cryptosystem. ... intractable problem of fast and highly secure image encryption. ...
Signcryption primitive is a better approach then Encrypt-then-Sign or Sign-then-Encrypt methods regarding the costs. ... The purpose of the study is to combine the public key encryption with Schnorr digital signature in order to obtain less computational and communicational costs. ... Zheng also proposed an elliptic curvebased signcryption scheme that saves 58% of computational and 40% of communication costs when it is compared with the traditional elliptic curve-based signaturethen-encryption ...doi:10.4236/jsea.2012.52016 fatcat:lnmjdpret5e63atgffv6snkc7q
Lecture Notes in Computer Science
Rogaway, DHIES: An encryption scheme based on the Diffie-Hellman problem, Preprint, 2001.  L. M. Adleman and J. ... A subexponential algorithm for discrete logarithms over the rational subgroup of the Jacobians of large genus hyperelliptic curves over finite fields, ANTS I (L. M. ... Optimal asymmetric encryption -How to encrypt with RSA, EUROCRYPT 1994 (A. De Santis, ed.), LNCS, vol. 950, Springer, 1995, pp. 92-111. ...doi:10.1007/978-3-642-03356-8_20 fatcat:lst54auksbgvxaynf3gtsswva4
So, the data should be secured in each layers. So many normal encipher mechanisms are used. Also, emerging encryption technology such as homomorphic encryption standards used in MCPS. ... Index Terms-Medical cyber physical systems, medical data privacy, homomorphic encryption, attribute-based encryption ... While this design implies only secure storage using conventional encryption schemes, emerging encryption schemes provide options for secure data sharing and secure computation. II. ...doi:10.18535/ijecs/v6i2.06 fatcat:4gtyoa2qvvgszkog7ruleyrjri
In this paper; an efficient and provably secure authentication mechanism is proposed to give a legitimate user the right to access and manage the cloud resources. ... So enterprises can use the available services and resources to develop, host, and run services over their infrastructure in a flexible way anytime, anywhere with minimal management efforts. ... Where 4a3+27b2≠ 0, so that for each value of a&b gives a different elliptic curve so that all points (x,y) which satisfies the Security of elliptic curve The main issue which describes the security ...doi:10.5120/ijca2016909883 fatcat:q2ytxedtpbewha4gg23jnxzlzq
functions, and also presented a construction method for broadcast encryption schemes that com- bines Fiat-Naor key predistribution schemes with ideal secret shar- ing schemes. ... The practical significance of the technique is illustrated by giving the design for three $10 million custom machines which could be built with current technology: one finds elliptic curve logarithms in ...
An AES algorithm with ECC scheme and keyword server technique is used to handle this issue efficiently. This technique ensures faster and secure access of files in the cloud. ... This paper deals with the technique that uses the cloud to search file in the encrypted form. ... It also introduces a special adversary to break the provable security reduction scheme. ...doi:10.30534/ijwcnt/2019/12832019 fatcat:felvypwiobaupgmgjaympqiqjy
Security in Fixed and Wireless Networks
Therefore, cryptology is a research area with a high strategic impact for industries, individuals, and for the society as a whole. ... Digital signature algorithms (in combination with hash functions) replace hand-written signatures in electronic transactions. A similar role can be played by MAC algorithms. ... on elliptic curve. ...doi:10.1002/0470863722.ch3 fatcat:kye7h3pmnbhkjksvyr4tj4nj7e
Computer Science and Communications Dictionary
Therefore, cryptology is a research area with a high strategic impact for industries, individuals, and for the society as a whole. ... Digital signature algorithms (in combination with hash functions) replace hand-written signatures in electronic transactions. A similar role can be played by MAC algorithms. ... on elliptic curve. ...doi:10.1007/1-4020-0613-6_18768 fatcat:24uzmmq3pbekxhlquwjzglnsve
elliptic curve (126-141); Erkay Savas, Thomas A. ... Katsuyuki Okeya and Kouichi Sakurai, Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recov- 93 SYSTEMS THEORY; CONTROL 5692 ery of the y-coordinate on a Montgomery-form ...
The scheme has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem. Our system is based on the Weil pairing. ... We point out a concrete vulnerability of some of the previous schemes and present an efficient fair blind signature scheme with a security proof against most general attacks. ...
Zhang et al. presents an anonymous authenticated key exchange protocol, based on Elliptic Curves Cryptography (ECC). ... encryption scheme. ...doi:10.1155/2018/7079037 fatcat:v52bgxp5enbqddcqy557hilstm
basic security services. ... The paper analyzes the construction of the crypto-code structure of the Niederriter on elliptical (EC), modified elliptical codes (MEC) shortened and / or extended, and defective codes, practical algorithms ... model for encryption and distribution is a "semantically secure encryption" scheme. ...doi:10.30748/soi.2020.162.09 fatcat:xs6v4myjvbfvhd3sbjbkjypoti
In 2014, Lo and Tsai  , a provable secured PS scheme is presented for efficient communication system. ... The proposed scheme is based on hyperelliptic curve, an advanced version of elliptic curve characterized by a small parameter and key size (80 bits) as compared to elliptic curve, in which the key size ... If the additional bits are smaller in size, then the communication will be fast; otherwise, delays will occur in communications. In this phase, we compare our designed CB-PS with existing ones, i.e. ...doi:10.1109/access.2020.3033758 fatcat:745n3yssvnhnffzcy2zkggbfvu
« Previous Showing results 1 — 15 out of 836 results