DocumentCode :
2086768
Title :
Method to generate elliptic curves based on CM algorithm
Author :
Yu, Bin
Author_Institution :
Dept. of Document Examination, China Criminal Police Univ., Shenyang, China
fYear :
2010
fDate :
17-19 Dec. 2010
Firstpage :
164
Lastpage :
166
Abstract :
The cryptosystem of elliptic curve had been put forward by Miller and Koblitz solely in 1985. The cryptosystem of elliptic curve owns three special advantages in terms of recent research: 1. It has larger flexibility when it chooses groups; 2. There wouldn´t be any effective sub-index arithmetic to attack it if the cryptosystem of elliptic curve is suitably chosen; 3. It has a short key. In this paper, an efficient method to generate the elliptic curves which bases on the CM algorithm is presented .It may generate many elliptic curves which are suitable for building the cryptosystem. With the characteristic of high security and easy implementation, this kind of elliptic curves provides foundation for the construction of the cryptosystem over the elliptic curves, which can resist all kinds of attacks on itself. Meanwhile, in this paper the steps of the new algorithm are presented and its correctness and feasibility are proved and analyzed in theory. The advantages that the cryptosystem of elliptic curve owns are quite suitable for the encryption of the web communication, and it has become the research hotspot of web communication security field.
Keywords :
public key cryptography; CM algorithm; elliptic curves generation; web communication security field; Algorithm design and analysis; Elliptic curve cryptography; Elliptic curves; Equations; Mathematical model; CM algorithm; cryptosystemy; elliptic curve;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory and Information Security (ICITIS), 2010 IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-6942-0
Type :
conf
DOI :
10.1109/ICITIS.2010.5688754
Filename :
5688754
Link To Document :
بازگشت