{"title":"PEC——一个替代的和更有效的公钥密码系统","authors":"R. Krishnan","doi":"10.5121/ijcis.2018.8101","DOIUrl":null,"url":null,"abstract":"In an increasingly connected world, security is a top concern for Internet of Things (IoT). These IoT devices have to be inexpensive implying that they will be constrained in storage and computing resources. In order to secure such devices, highly efficient public key cryptosystems (PKC) are critical. Elliptic Curve Cryptography (ECC) is the most commonly implemented PKC in use today. In this paper, an alternate and a more efficient PKC, called the PEC (Pells Equation Cryptography) has been proposed based on Pells equation: x−D ∗y ≡ 1 (mod p). It is shown that scalar multiplication in PEC is significantly more efficient compared to ECC. It is also shown that the Discrete Logarithm Problem computing the private key from the public key in PEC is at least as hard as that of ECC.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":0.5000,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"PEC - An Alternate and More Efficient Public Key Cryptosystem\",\"authors\":\"R. Krishnan\",\"doi\":\"10.5121/ijcis.2018.8101\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In an increasingly connected world, security is a top concern for Internet of Things (IoT). These IoT devices have to be inexpensive implying that they will be constrained in storage and computing resources. In order to secure such devices, highly efficient public key cryptosystems (PKC) are critical. Elliptic Curve Cryptography (ECC) is the most commonly implemented PKC in use today. In this paper, an alternate and a more efficient PKC, called the PEC (Pells Equation Cryptography) has been proposed based on Pells equation: x−D ∗y ≡ 1 (mod p). It is shown that scalar multiplication in PEC is significantly more efficient compared to ECC. It is also shown that the Discrete Logarithm Problem computing the private key from the public key in PEC is at least as hard as that of ECC.\",\"PeriodicalId\":54966,\"journal\":{\"name\":\"International Journal of Cooperative Information Systems\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2018-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Cooperative Information Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.5121/ijcis.2018.8101\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cooperative Information Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.5121/ijcis.2018.8101","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
PEC - An Alternate and More Efficient Public Key Cryptosystem
In an increasingly connected world, security is a top concern for Internet of Things (IoT). These IoT devices have to be inexpensive implying that they will be constrained in storage and computing resources. In order to secure such devices, highly efficient public key cryptosystems (PKC) are critical. Elliptic Curve Cryptography (ECC) is the most commonly implemented PKC in use today. In this paper, an alternate and a more efficient PKC, called the PEC (Pells Equation Cryptography) has been proposed based on Pells equation: x−D ∗y ≡ 1 (mod p). It is shown that scalar multiplication in PEC is significantly more efficient compared to ECC. It is also shown that the Discrete Logarithm Problem computing the private key from the public key in PEC is at least as hard as that of ECC.
期刊介绍:
The paradigm for the next generation of information systems (ISs) will involve large numbers of ISs distributed over large, complex computer/communication networks. Such ISs will manage or have access to large amounts of information and computing services and will interoperate as required. These support individual or collaborative human work. Communication among component systems will be done using protocols that range from conventional ones to those based on distributed AI. We call such next generation ISs Cooperative Information Systems (CIS).
The International Journal of Cooperative Information Systems (IJCIS) addresses the intricacies of cooperative work in the framework of distributed interoperable information systems. It provides a forum for the presentation and dissemination of research covering all aspects of CIS design, requirements, functionality, implementation, deployment, and evolution.