Elliptic curve scalar multiplication algorithm using complementary recoding

被引:23
作者
Balasubramaniam, P.
Karthikeyan, E. [1 ]
机构
[1] Gandhigram Rural Univ, Dept Comp Sci & Applicat, Dindigul 624302, Tamil Nadu, India
[2] Gandhigram Rural Univ, Dept Math, Dindigual 624302, Tamil Nadu, India
关键词
cryptography; signed binary method; complement recoding; window method; scalar multiplication;
D O I
10.1016/j.amc.2007.01.015
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Elliptic curve based cryptosystem is an efficient public key cryptosystem, which is more suitable for limited environments. The very expensive operation in elliptic curve based cryptographic protocol is the scalar multiplication. In this paper, scalar multiplication using complementary recoding method is proposed. The intermediate operations carried out in conversion are less than the other existing scalar multiplication algorithm. The efficiency of our proposed method is tested and found that our method is an efficient than the other methods. (C) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:51 / 56
页数:6
相关论文
共 14 条
[1]  
[Anonymous], 2000, 1363 IEEE
[2]   A SIGNED BINARY MULTIPLICATION TECHNIQUE [J].
BOOTH, AD .
QUARTERLY JOURNAL OF MECHANICS AND APPLIED MATHEMATICS, 1951, 4 (02) :236-240
[3]  
Chang CC, 2003, AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, P807
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[6]   Optimal left-to-right binary signed-digit recoding [J].
Joye, M ;
Yen, SM .
IEEE TRANSACTIONS ON COMPUTERS, 2000, 49 (07) :740-748
[7]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[8]  
Lopez J., 2000, OVERVIEW ELLIPTIC CU
[9]  
Menezes A. J., 1993, Journal of Cryptology, V6, P209, DOI 10.1007/BF00203817
[10]   USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY [J].
MILLER, VS .
LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 :417-426