Building cryptographic schemes based on elliptic curves over rational numbers

نویسندگان

چکیده

The possibility of using elliptic curves over the rational field non-zero ranks in cryptographic schemes is studied. For first time, construction cryptosystems proposed security which based on complexity solving knapsack problem numbers ranks. A new approach to use for proposed. few experiments have been carried out estimate heights characteristic points infinite order. model a cryptosystem resistant computations quantum computer and an order curve study effectiveness scheme has out. An attack secret search such implemented it shown that exponential. solution can be applied real as well protocols.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptographic schemes based on elliptic curve pairings

Cryptographic Schemes based on Elliptic Curve Pairings: Contributions to Public Key Cryptography and Key Agreement Protocols This thesis introduces the concept of certificateless public key cryptography (CLPKC). Elliptic curve pairings are then used to make concrete CL-PKC schemes and are also used to make other efficient key agreement protocols. CL-PKC can be viewed as a model for the use of p...

متن کامل

Root numbers and rational points on elliptic curves

This article is broadly based on the talk that was given at the symposium ‘Perspectives in the Mathematical Sciences’, held at Indian Statistical Institute (ISI), Bangalore, to celebrate the Platinum Jubilee of the ISI. I would like to thank the organisers, especially Professor N.S.N. Sastry, for inviting me to lecture on this occasion. The article is intended for a general audience and does no...

متن کامل

Construction of Rational Points on Elliptic Curves over Finite Fields

We give a deterministic polynomial-time algorithm that computes a nontrivial rational point on an elliptic curve over a finite field, given a Weierstrass equation for the curve. For this, we reduce the problem to the task of finding a rational point on a curve of genus zero.

متن کامل

On the torsion of rational elliptic curves over quartic fields

Let E be an elliptic curve defined over Q and let G = E(Q)tors be the associated torsion subgroup. We study, for a given G, which possible groups G ⊆ H could appear such that H = E(K)tors, for [K : Q] = 4 and H is one of the possible torsion structures that occur infinitely often as torsion structures of elliptic curves defined over quartic number fields. Let K be a number field, and let E be a...

متن کامل

A cryptographic processor for arbitrary elliptic curves over GF(2m)

We describe a cryptographic processor for Elliptic Curve Cryptography (ECC). ECC is evolving as an attractive alternative to other public-key cryptosystems such as the Rivest-ShamirAdleman algorithm (RSA) by offering the smallest key size and the highest strength per bit. The cryptographic processor performs point multiplication for elliptic curves over binary polynomial fields GF(2m). In contr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nau?no-tehni?eskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki

سال: 2022

ISSN: ['2226-1494', '2500-0373']

DOI: https://doi.org/10.17586/2226-1494-2022-22-4-674-680