Selection of Security Elliptic Curve Based on Evolution Algorithm

被引:6
作者
Wang, Maocai [1 ,2 ]
Dai, Guangming
Hu, Hanping [1 ]
Pen, Lei [2 ]
机构
[1] Huazhong Univ Sci & Technol, Inst Pattern Recognit & Artificial Intelligence, Wuhan 430074, Peoples R China
[2] China Univ Geosci, Sch Comp, Wuhan 430074, Peoples R China
来源
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL I | 2009年
关键词
Elliptic curve; Selection algorithm; ECDLP; Evolution algorithm; CRYPTOGRAPHY;
D O I
10.1109/CINC.2009.205
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Applying evolution algorithm to selection of security elliptic curve(EC) is first researched in the paper. In order to ensure the security of elliptic curve cryptosystem(ECC), it is necessary that the elliptic curves are safe against all kinds of attack algorithms about the elliptic curve discrete logarithm problem (ECDLP). Therefore, selection of secure elliptic curves is a mathematics difficult problem. In this paper, selection principles of secure EC are firstly analyzed. Then, based on the selection principle, a selection algorithm of security EC based on evolution algorithm is put forward. The thoughts of encoding, crossover and mutation of evolution algorithm for selection of EC are discussed in detail. The implementation result shows the availability and efficiency of the algorithm.
引用
收藏
页码:55 / +
页数:2
相关论文
共 50 条
  • [21] An improved Elliptic Curve Digital Signature Algorithm
    Fan Ai-wan
    Lu Shu-xi
    MECHANICAL ENGINEERING AND GREEN MANUFACTURING, PTS 1 AND 2, 2010, : 1024 - 1027
  • [22] An elliptic curve-based approach for enhanced security of substitution-permutation networks
    Farwa, Shabieh
    Rehman, Abdur
    Shahid, Aaminah
    INTERNATIONAL JOURNAL OF COMPUTATIONAL MATERIALS SCIENCE AND ENGINEERING, 2024,
  • [23] Privacy-preserving Distributed Optimization Algorithm Based on Elliptic Curve ELGamal
    Zhao, Zhong-Yuan
    Gao, Wang
    Jiang, Lu-Yao
    Ge, Quan-Bo
    Zidonghua Xuebao/Acta Automatica Sinica, 2025, 51 (01): : 210 - 220
  • [24] Low-Cost RFID Authentication Protocol Based on Elliptic Curve Algorithm
    Baashirah, Rania
    Abuzneid, Abdelshakour
    Mellouki, Salah Addine
    Siraj, Zeba
    Zhan, Cheng
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2021, 13 (02) : 1 - 11
  • [25] Hash Function and Digital Signature based on Elliptic Curve
    Manel, Dridi
    Raouf, Ouni
    Ramzi, Haddaji
    Mtibaa, Abdellatif
    14TH INTERNATIONAL CONFERENCE ON SCIENCES AND TECHNIQUES OF AUTOMATIC CONTROL & COMPUTER ENGINEERING STA 2013, 2013, : 388 - 392
  • [26] Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
    Sajjad, Anum
    Afzal, Mehreen
    Iqbal, Waseem
    Abbas, Haider
    Latif, Rabia
    Raza, Rana Aamir
    IEEE ACCESS, 2020, 8 : 139903 - 139917
  • [27] Mobile SMS Banking Security Using Elliptic Curve Cryptosystem
    Soram, Ranbir
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (06): : 30 - 38
  • [28] Computational Refinements for Post-Quantum Elliptic Curve Security
    Sakk, Eric
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 32 - 35
  • [29] Fast Elliptic Curve Point Multiplication Algorithm Optimization
    Zhang HaiBin
    Ji XiaoPing
    Wu BoYing
    Li GuangYu
    MACHINERY ELECTRONICS AND CONTROL ENGINEERING III, 2014, 441 : 1044 - +
  • [30] Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras
    Man, Zhenlong
    Liu, Jianmeng
    Zhang, Fan
    Meng, Xiangfu
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 113 : 169 - 180