Selection of Security Elliptic Curve Based on Evolution Algorithm

被引:6
作者
Wang, Maocai [1 ,2 ]
Dai, Guangming
Hu, Hanping [1 ]
Pen, Lei [2 ]
机构
[1] Huazhong Univ Sci & Technol, Inst Pattern Recognit & Artificial Intelligence, Wuhan 430074, Peoples R China
[2] China Univ Geosci, Sch Comp, Wuhan 430074, Peoples R China
来源
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL I | 2009年
关键词
Elliptic curve; Selection algorithm; ECDLP; Evolution algorithm; CRYPTOGRAPHY;
D O I
10.1109/CINC.2009.205
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Applying evolution algorithm to selection of security elliptic curve(EC) is first researched in the paper. In order to ensure the security of elliptic curve cryptosystem(ECC), it is necessary that the elliptic curves are safe against all kinds of attack algorithms about the elliptic curve discrete logarithm problem (ECDLP). Therefore, selection of secure elliptic curves is a mathematics difficult problem. In this paper, selection principles of secure EC are firstly analyzed. Then, based on the selection principle, a selection algorithm of security EC based on evolution algorithm is put forward. The thoughts of encoding, crossover and mutation of evolution algorithm for selection of EC are discussed in detail. The implementation result shows the availability and efficiency of the algorithm.
引用
收藏
页码:55 / +
页数:2
相关论文
共 50 条
  • [1] Elliptic Curve Signcryption Based Security Protocol for RFID
    Singh, Anuj Kumar
    Patro, B. D. K.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 344 - 365
  • [2] Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm
    Sudharson, K.
    Arun, S.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03) : 1769 - 1784
  • [3] Development of security scheme on wireless sensor network based on Elliptic Curve Cryptography
    Li, Dongmei
    Liu, Yan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMMERCE AND SOCIETY, 2015, 17 : 630 - 634
  • [4] Based on Elliptic Curve and Combination Chaos Mapping Security System
    Liang, Dongying
    PROCEEDINGS OF 2010 ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2010, : 868 - 872
  • [5] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Rosheen Qazi
    Kashif Naseer Qureshi
    Faisal Bashir
    Najam Ul Islam
    Saleem Iqbal
    Arsalan Arshad
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 547 - 566
  • [6] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Qazi, Rosheen
    Qureshi, Kashif Naseer
    Bashir, Faisal
    Islam, Najam Ul
    Iqbal, Saleem
    Arshad, Arsalan
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 547 - 566
  • [7] An Elliptic Curve Algorithm for Iris Pattern Recognition
    Vishnubhatla, Sasank Venkata
    2015 ANNUAL GLOBAL ONLINE CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGY (GOCICT), 2016, : 51 - 59
  • [8] An Efficient ID Based Security Algorithm for Mutual Node Authentication and Key Management: An Elliptic Curve Cryptography Based Approach
    Sen, Nilanjan
    APPLIED ALGORITHMS, 2014, 8321 : 110 - 121
  • [9] An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security
    Vincent O.R.
    Okediran T.M.
    Abayomi-Alli A.A.
    Adeniran O.J.
    SN Computer Science, 2020, 1 (2)
  • [10] An optimized watermarking scheme based on genetic algorithm and elliptic curve
    Azam, Naveed Ahmed
    Haider, Takreem
    Hayat, Umar
    SWARM AND EVOLUTIONARY COMPUTATION, 2024, 91