A nonlinear elliptic curve cryptosystem based on matrices

被引:11
作者
Climent, JJ [1 ]
Ferrández, F [1 ]
Vicent, JF [1 ]
Zamora, A [1 ]
机构
[1] Univ Alacant, Dept Ciencia Computac & Intelligencia Artificial, E-03080 Alacant, Spain
关键词
public key cryptography; elliptic curves; discrete logarithm problem; elliptic curve discrete logarithm problem; finite field; Diffie-Hellman key agreement;
D O I
10.1016/j.amc.2005.03.032
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We propose a new mathematical problem that is applicable to public key cryptography. Based on the Discrete Logarithm Problem (DLP), it uses certain elements formed by two matrices with elements in a finite field and a matrix whose elements are points of an elliptic curve. With this system, we get a larger key space without increasing the underlying elliptic curve and, consequently, without the computational requirements inherent to the set up of elliptic Curves at random. Also, we expose the Diffie-Hellman key agreement protocol with this system acting as the underlying mathematical problem. (c) 2005 Elsevier Inc. All rights reserved.
引用
收藏
页码:150 / 164
页数:15
相关论文
共 50 条
[31]   A new ElGamal-like cryptosystem based on matrices over groupring [J].
Inam, Saba ;
Ali, Rashid .
NEURAL COMPUTING & APPLICATIONS, 2018, 29 (11) :1279-1283
[32]   Mayfly optimistic hyperelliptic curve cryptosystem [J].
Reddy, Ramireddy Nava Teja ;
Kavitha, M. ;
Reddy, G. Sudarsana ;
Yousef, Amr ;
Aboras, Kareem M. ;
Emara, Ahmed ;
Reddy, Ch. Rami .
FRONTIERS IN COMPUTER SCIENCE, 2024, 6
[33]   Beyond the excised ensemble: modelling elliptic curve L-functions with random matrices [J].
Cooper, I. A. ;
Morris, Patrick W. ;
Snaith, N. C. .
JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2016, 49 (07)
[34]   The "Elliptic" Matrices and a New Kind of Cryptography [J].
Cheddour, Zakariae ;
Chillali, Abdelhakim ;
Mouhib, Ali .
BOLETIM SOCIEDADE PARANAENSE DE MATEMATICA, 2023, 41
[35]   Elliptic curve cryptography on smart cards [J].
de-Miguel-de-Santos, M ;
Sanchez-Avila, C ;
Sanchez-Reillo, R .
8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2004, :162-167
[36]   Elliptic curve cryptography based wireless authentication protocol [J].
Yongliang, Liu ;
Gao, Wen ;
Yao, Hongxun ;
Yu, Xinghua .
International Journal of Network Security, 2007, 5 (03) :327-337
[37]   Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols [J].
Sajjad, Anum ;
Afzal, Mehreen ;
Iqbal, Waseem ;
Abbas, Haider ;
Latif, Rabia ;
Raza, Rana Aamir .
IEEE ACCESS, 2020, 8 :139903-139917
[38]   COMPARATIVE ANALYSIS OF ELLIPTIC CURVE AND LATTICE BASED CRYPTOGRAPHY [J].
Davenport, Amanda ;
Shetty, Sachin .
PROCEEDINGS OF THE 2021 ANNUAL MODELING AND SIMULATION CONFERENCE (ANNSIM'21), 2020,
[39]   An Integrated Image Encryption Scheme Based on Elliptic Curve [J].
Khalid, Ijaz ;
Shah, Tariq ;
Eldin, Sayed M. ;
Shah, Dawood ;
Asif, Muhammad ;
Saddique, Imran .
IEEE ACCESS, 2023, 11 :5483-5501
[40]   Hybrid Cryptosystem Based on Pseudo Chaos of Novel Fractional Order Map and Elliptic Curves [J].
Al-Khedhairi, Abdulrahman ;
Elsonbaty, Amr ;
Elsadany, Abdelalim A. ;
Hagras, Esam A. A. .
IEEE ACCESS, 2020, 8 :57733-57748