{"title":"基于椭圆曲线的身份验证公钥加密","authors":"Yiliang Han, Xiaoyuan Yang, Yu-pu Hu","doi":"10.1109/ICESS.2005.34","DOIUrl":null,"url":null,"abstract":"An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm ECDSA and achieves both privacy and authenticity in the method of ECDLP which is the most practical cryptographic primitive in the future. The scheme saves 78%-82% computation costs in all. It also saves 14% storage costs for current security parameters and 9% storage costs for high level security in average. The saving is significant potentially, especially in power restricted applications such as embedded systems and mobile computing. Arguments show that the scheme is secure at present. Compared with RFC1421 and existed results, the scheme for multiple users also discussed.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Authenticated public-key encryption based on elliptic curve\",\"authors\":\"Yiliang Han, Xiaoyuan Yang, Yu-pu Hu\",\"doi\":\"10.1109/ICESS.2005.34\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm ECDSA and achieves both privacy and authenticity in the method of ECDLP which is the most practical cryptographic primitive in the future. The scheme saves 78%-82% computation costs in all. It also saves 14% storage costs for current security parameters and 9% storage costs for high level security in average. The saving is significant potentially, especially in power restricted applications such as embedded systems and mobile computing. Arguments show that the scheme is secure at present. Compared with RFC1421 and existed results, the scheme for multiple users also discussed.\",\"PeriodicalId\":360757,\"journal\":{\"name\":\"Second International Conference on Embedded Software and Systems (ICESS'05)\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Second International Conference on Embedded Software and Systems (ICESS'05)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICESS.2005.34\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Second International Conference on Embedded Software and Systems (ICESS'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICESS.2005.34","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Authenticated public-key encryption based on elliptic curve
An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm ECDSA and achieves both privacy and authenticity in the method of ECDLP which is the most practical cryptographic primitive in the future. The scheme saves 78%-82% computation costs in all. It also saves 14% storage costs for current security parameters and 9% storage costs for high level security in average. The saving is significant potentially, especially in power restricted applications such as embedded systems and mobile computing. Arguments show that the scheme is secure at present. Compared with RFC1421 and existed results, the scheme for multiple users also discussed.