Elliptic Curve Cryptosystem for Email Encryption
نویسندگان
چکیده
منابع مشابه
A Threshold Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem
A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an authenticated cipher-text for a message and only the designated verifier can verify the message. Recently, Chung et al. [1] proposed a (t, n) threshold authenticated encryption scheme by applying a division-of-labor signature technique. However, we showed that the scheme has a design flaw. Then, we propo...
متن کاملThe Elliptic Curve Cryptosystem
The Elliptic Curve Cryptosystem (ECC) provides the highest strength-per-bit of any cryptosystem known today. This paper provides an overview of the three hard mathematical problems which provide the basis for the security of publickey cryptosystems used today: the integer factorization problem (IFP), the discrete logarithm problem (DLP), and the elliptic curve discrete logarithm problem (ECDLP)...
متن کامل1 Elliptic Curve Cryptosystem and its Applications
The goal of this research is to develop a basis for utilizing efficient encryption schemes in wireless communications and in devices with low computing power and resources. Elliptic Curve Cryptography (ECC) fits well for an efficient and secure encryption scheme. It is more efficient than the ubiquitous RSA based schemes because ECC utilizes smaller key sizes for equivalent security. A comparat...
متن کاملECCPERT Elliptic Curve Cryptosystem Development and Design
ECCpert is an implementation of an Elliptic Curve Cryptosystem which is based over a finite field from special class called Optimal Extension Fields (OEFs). OEFs utilise the fast integer arithmetic available on modern processors to produce very efficient results. Thus, they do not need to resort to multiprecision operations or arithmetic using polynomials of large degree. This paper discusses t...
متن کاملA Secure and Efficient Convertible Authenticated Encryption Scheme with Message Linkages Using Elliptic Curve Cryptosystem
A convertible authenticated encryption scheme is very useful for transmitting a confidential message in insecure communication networks. This paper proposes a convertible authenticated encryption scheme with message linkages for message flows using Elliptic Curve Cryptography (ECC). The proposed scheme has the following advantages. (1) It can provide non-repudiation when the signer repudiates h...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer and Communication Technology
سال: 2010
ISSN: 2231-0371,0975-7449
DOI: 10.47893/ijcct.2010.1049