Elliptic Curves over a Finite Ring

被引:0
作者
Cheddour, Zakariae [1 ]
Chillali, Abdelhakim [1 ]
Mouhib, Ali [1 ]
机构
[1] Univ Sidi Mohamed Ben Abdellah USMBA, Dept Math, LSI Lab, Fes 1223, Morocco
来源
ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES | 2023年 / 50卷 / 02期
关键词
Cryptosystem; elliptic curves; keys exchange; finite field; finite ring; local ring; PUBLIC-KEY CRYPTOSYSTEM; LOGARITHMS;
D O I
10.52846/ami.v50i2.1689
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Let Fq be a finite field, where q is a power of a prime p such that p >= 5. Let alpha be a root of a monic polynomial of a minimal degree over Fq. In this paper, we will study elliptic curves over (Fq[alpha], +, *), where + is the usual addition and * represent a non-standard product law over Fq[alpha]. Using elliptic curves over this ring can result in a cryptographic method that is fast, simple and secure.
引用
收藏
页码:313 / 324
页数:12
相关论文
共 29 条
  • [1] On the discrete logarithm problem for prime-field elliptic curves
    Amadori, Alessandro
    Pintore, Federico
    Sala, Massimiliano
    [J]. FINITE FIELDS AND THEIR APPLICATIONS, 2018, 51 : 168 - 182
  • [2] Blake I.F., 1999, ELLIPTIC CURVES CRYP
  • [3] COMPLETE SYSTEMS OF 2 ADDITION LAWS FOR ELLIPTIC-CURVES
    BOSMA, W
    LENSTRA, HW
    [J]. JOURNAL OF NUMBER THEORY, 1995, 53 (02) : 229 - 240
  • [4] Elliptic Curves Over the Ring R*
    Boulbot, A.
    Chillali, A.
    Mouhib, A.
    [J]. BOLETIM SOCIEDADE PARANAENSE DE MATEMATICA, 2020, 38 (03): : 193 - 201
  • [5] Boulbot A., 2016, Gulf Journal of Mathematics, V4, P123
  • [6] The "Elliptic" Matrices and a New Kind of Cryptography
    Cheddour, Zakariae
    Chillali, Abdelhakim
    Mouhib, Ali
    [J]. BOLETIM SOCIEDADE PARANAENSE DE MATEMATICA, 2023, 41
  • [7] Chillali A., 2011, International Mathematical Forum, V4, P1501
  • [8] Compact elliptic curve representations
    Ciet, Mathieu
    Quisquater, Jean-Jacques
    Sica, Francesco
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2011, 5 (01) : 89 - 100
  • [9] Cramer R., 2000, ACM Transactions on Information and Systems Security, V3, P161, DOI 10.1145/357830.357847
  • [10] Cramer R, 1998, LECT NOTES COMPUT SC, V1462, P13, DOI 10.1007/BFb0055717