A new encryption algorithm over elliptic curve
Access Status
Authors
Date
2005Type
Metadata
Show full item recordCitation
Source Title
Source Conference
Faculty
School
Remarks
Copyright 2005 IEEE
Reprinted from:
2005 3rd IEEE International Conference on Industrial Informatics (INDIN) Perth, Australia 10-12 August 2005
IEEE Catalog Number ISBN 05EX1057
ISBN 0-7803-9094-6
This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Curtin University of Technology's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org.
By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
Collection
Abstract
Various public key encryption systems have been proposed in modern information techology. Some of them have also been used in various applications, such as E-commerce and mobile database. This paper proposes two secure receipt oriented encryption systems. The decryptioner's private keys could be changed with the different time periods. This case would be very useful in some practical scenarios, for instance, in a mobile database environment. Besides the semantic security, the proposed schemes have the backward-and-future security, a new security requirement for semantically secure encryption schemes. In terms of construction, the two schemes are based on the pairings over elliptic curves. Also, this paper provides a heuristic security analysis for the underlying system.
Related items
Showing items related by title, author, creator and subject.
-
Salam, M.; Yau, W.; Chin, J.; Heng, S.; Ling, Huo Chong; Phan, R.; Poh, G.; Tan, S.; Yap, W. (2015)Ensuring the cloud data security is a major concern for corporate cloud subscribers and in some cases for the private cloud users. Confidentiality of the stored data can be managed by encrypting the data at the client ...
-
Radmand, Pedram; Singh, Jaipal; Talevski, Alex; Domingo, M.; Arnedo, J. (2011)Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS. This paper will investigate how end-to-end ...
-
Radmand, Pedram; Singh, Jaipal; Domingo, M.; Arnedo, J.; Talevski, Alex (2010)Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS. This paper will investigate how end-to-end ...