Applied Mathematics

Volume 7, Issue 3 (February 2016)

ISSN Print: 2152-7385   ISSN Online: 2152-7393

Google-based Impact Factor: 0.96  Citations  

Cryptographic Schemes Based on Elliptic Curves over the Ring Zp[i]

HTML  XML Download Download as PDF (Size: 290KB)  PP. 304-312  
DOI: 10.4236/am.2016.73027    3,579 Downloads   5,359 Views  Citations

ABSTRACT

Elliptic Curve Cryptography recently gained a lot of attention in industry. The principal attraction of ECC compared to RSA is that it offers equal security for a smaller key size. The present paper includes the study of two elliptic curve and defined over the ring where . After showing isomorphism between and , we define a composition operation (in the form of a mapping) on their union set. Then we have discussed our proposed cryptographic schemes based on the elliptic curve . We also illustrate the coding of points over E, secret key exchange and encryption/decryption methods based on above said elliptic curve. Since our proposed schemes are based on elliptic curve of the particular type, therefore the proposed schemes provides a highest strength-per-bit of any cryptosystem known today with smaller key size resulting in faster computations, lower power assumption and memory. Another advantage is that authentication protocols based on ECC are secure enough even if a small key size is used.

Share and Cite:

Kumar, M. and Gupta, P. (2016) Cryptographic Schemes Based on Elliptic Curves over the Ring Zp[i]. Applied Mathematics, 7, 304-312. doi: 10.4236/am.2016.73027.

Cited by

[1] Securing data in Wireless Sensor Network using Hybrid ECC+ AES Cryptographic Approach
… and Smart Electrical …, 2023
[2] Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
2021
[3] A verifiable ring signature scheme of anonymous signcryption using ECC
International Journal of Mathematical Sciences …, 2021
[4] Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring. Symmetry 2021, 13, 45
2020
[5] Lightweight and authenticated key exchange based on self linear pairings
2020
[6] Kriptografi Kunci Publik Kurva Eliptik Atas Lapangan Hingga Dan Implementasinya Menggunakan Bahasa Pemrograman Python Untuk Membuat Python Packages
2019
[7] An Efficient and Authentication Signcryption Scheme Based on Elliptic Curves
2019
[8] Kriptografi Kunci Publik Kurva Eliptik Atas Lapangan Hingga Dan Implementasinya Menggunakan Bahasa Pemrograman Python Untuk Membuat Python …
Universitas Islam Negeri Sunan Kalijaga …, 2019
[9] Elliptic Curve Signcryption Scheme with Low Computational Cost for Conventional Key Exchange Solution
2018
[10] A Novel and Secure Multiparty Key Exchange Scheme Using Trilinear Pairing Map Based on Elliptic Curve Cryptography
Soft Computing: Theories and Applications, 2018
[11] PAIRING-FRIENDLY ELLIPTIC CURVES OF EMBEDDING DEGREE 1 AND APPLICATIONS TO CRYPTOGRAPHY
2017
[12] Mediating role of job satisfaction on the relationship between compulsory citizenship behaviors and organizational citizenship behaviors
International Journal of Advanced Research and Development, 2017
[13] A Novel and Secure Multi-party Key Exchange Scheme Using Trilinear Pairing Map Based on Elliptic Curve Cryptography
2017
[14] AN AUTHENTICATION SECRET KEY GENERATION SCHEME USING BILINEAR SELF-PAIRING MAP BASED ON ELLIPTIC CURVE CRYPTOGRAPHY
International journal of advance research and innovative ideas in education, 2017

Copyright © 2025 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.