A Comparative Analysis of Hybrid Encryption Schemes Based on Elliptic Curves

نویسندگان

  • V. Gayoso Martínez
  • L. Hernández Encinas
  • Martín Muñoz
چکیده

Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures, and performing key exchanges. Regarding the encryption capability, the first schemes that appeared were either versions of already existing public-key algorithms (Massey-Omura and ElGamal) or new schemes specified ad hoc (MenezesVanstone). However, all the initial elliptic curve encryption schemes had similar problems, and thus were conveniently discarded by the academic community. The encryption schemes currently used are known as hybrid cryptosystems, as they use both symmetric and asymmetric techniques. Among those hybrid cryptosystems based on ECC, the best known ones are the Elliptic Curve Integrated Encryption Scheme (ECIES), the Provably Secure Elliptic Curve encryption scheme (PSEC), and the Advanced Cryptographic Engine (ACE). In this work, we present an extensive review of the basic concepts of elliptic curves, the initial ECC encryption algorithms, and the current ECC hybrid cryptosystems. After that, we provide a comprehensive comparison of ECIES, PSEC, and ACE, highlighting the main differences between them. Finally, we conclude that, with the available data, it can be stated that ECIES is the best ECC encryption scheme from a performance and ease of implementation point of view.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of ECIES and Other Cryptosystems Based on Elliptic Curves

Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. Regarding the encryption procedure, the schemes currently used are known as hybrid cryptosystems, as they use both symmetric and asymmetric techniques. Among those hybrid cryptosystems based on ECC, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the b...

متن کامل

How to Construct Efficient Signcryption Schemes on Elliptic Curves

Signcryption is a new paradigm in public key cryptography. A remarkable property of a signcryption scheme is that it fulfills both the functions of public key encryption and digital signature, with a cost significantly smaller than that required by signature-then-encryption. The purposes of this paper are to demonstrate how to specify signcryption schemes on elliptic curves over finite fields, ...

متن کامل

Eecient Signcryption Schemes on Elliptic Curves

Signcryption is a new paradigm in public key cryptography. A remarkable property of a signcryption scheme is that it fulllls both the functions of public key encryption and digital signature, with a cost signiicantly smaller than that required by signature-then-encryption. The purposes of this paper are to demonstrate how to specify signcryption schemes on elliptic curves over nite elds, and to...

متن کامل

Trapdooring Discrete Logarithms on Elliptic Curves over Rings

This paper introduces three new probabilistic encryption schemes using elliptic curves over rings. The cryptosystems are based on three specific trapdoor mechanisms allowing the recipient to recover discrete logarithms on different types of curves. The first scheme is an embodiment of Naccache and Stern’s cryptosystem and realizes a discrete log encryption as originally wanted in [23] by Vansto...

متن کامل

A Review of Elliptic Curve based Signcryption Schemes

Signcryption is a new cryptographic approach which provides authentication and encryption simultaneously in a single logical step. The aim is to reduce the cost of signature-then-encryption approach. This cost includes computational cost and communication cost. Furthermore some signcryption schemes are based on RSA while some are based on elliptic curve. This paper provides a critical review of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013