Building cryptographic schemes based on elliptic curves over rational numbers
نویسندگان
چکیده
The possibility of using elliptic curves over the rational field non-zero ranks in cryptographic schemes is studied. For first time, construction cryptosystems proposed security which based on complexity solving knapsack problem numbers ranks. A new approach to use for proposed. few experiments have been carried out estimate heights characteristic points infinite order. model a cryptosystem resistant computations quantum computer and an order curve study effectiveness scheme has out. An attack secret search such implemented it shown that exponential. solution can be applied real as well protocols.
منابع مشابه
Cryptographic schemes based on elliptic curve pairings
Cryptographic Schemes based on Elliptic Curve Pairings: Contributions to Public Key Cryptography and Key Agreement Protocols This thesis introduces the concept of certificateless public key cryptography (CLPKC). Elliptic curve pairings are then used to make concrete CL-PKC schemes and are also used to make other efficient key agreement protocols. CL-PKC can be viewed as a model for the use of p...
متن کاملRoot numbers and rational points on elliptic curves
This article is broadly based on the talk that was given at the symposium ‘Perspectives in the Mathematical Sciences’, held at Indian Statistical Institute (ISI), Bangalore, to celebrate the Platinum Jubilee of the ISI. I would like to thank the organisers, especially Professor N.S.N. Sastry, for inviting me to lecture on this occasion. The article is intended for a general audience and does no...
متن کاملConstruction of Rational Points on Elliptic Curves over Finite Fields
We give a deterministic polynomial-time algorithm that computes a nontrivial rational point on an elliptic curve over a finite field, given a Weierstrass equation for the curve. For this, we reduce the problem to the task of finding a rational point on a curve of genus zero.
متن کاملOn the torsion of rational elliptic curves over quartic fields
Let E be an elliptic curve defined over Q and let G = E(Q)tors be the associated torsion subgroup. We study, for a given G, which possible groups G ⊆ H could appear such that H = E(K)tors, for [K : Q] = 4 and H is one of the possible torsion structures that occur infinitely often as torsion structures of elliptic curves defined over quartic number fields. Let K be a number field, and let E be a...
متن کاملA cryptographic processor for arbitrary elliptic curves over GF(2m)
We describe a cryptographic processor for Elliptic Curve Cryptography (ECC). ECC is evolving as an attractive alternative to other public-key cryptosystems such as the Rivest-ShamirAdleman algorithm (RSA) by offering the smallest key size and the highest strength per bit. The cryptographic processor performs point multiplication for elliptic curves over binary polynomial fields GF(2m). In contr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nau?no-tehni?eskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki
سال: 2022
ISSN: ['2226-1494', '2500-0373']
DOI: https://doi.org/10.17586/2226-1494-2022-22-4-674-680