Curtin University Homepage
  • Library
  • Help
    • Admin

    espace - Curtin’s institutional repository

    JavaScript is disabled for your browser. Some features of this site may not work without it.
    View Item 
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item

    A new encryption algorithm over elliptic curve

    19622_downloaded_stream_140.pdf (1.283Mb)
    Access Status
    Open access
    Authors
    Han, Song
    Chang, Elizabeth
    Liu, Wan-quan
    Potdar, Vidyasagar
    Wang, J.
    Date
    2005
    Type
    Conference Paper
    
    Metadata
    Show full item record
    Citation
    Han, Song and Chang, Elizabeth and Liu, Wan-quan and Potdar, Vidyasagar and Wang, J.. 2005. : A new encryption algorithm over elliptic curve, in Dillon, T. and Yu, X. and Chang, E. (ed), INDIN 2005: 3rd International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business, Aug 10 2005, pp. 675-679. Perth, WA: IEEE.
    Source Title
    3rd IEEE International Conference on Industrial Informatics (INDIN 2005)
    Source Conference
    INDIN 2005: 3rd International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business
    DOI
    10.1109/INDIN.2005.1560456
    Faculty
    Curtin Business School
    School of Information Systems
    School
    Centre for Extended Enterprises and Business Intelligence
    Remarks

    Copyright 2005 IEEE

    Reprinted from:

    2005 3rd IEEE International Conference on Industrial Informatics (INDIN) Perth, Australia 10-12 August 2005

    IEEE Catalog Number ISBN 05EX1057

    ISBN 0-7803-9094-6

    This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Curtin University of Technology's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org.

    By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

    URI
    http://hdl.handle.net/20.500.11937/38679
    Collection
    • Curtin Research Publications
    Abstract

    Various public key encryption systems have been proposed in modern information techology. Some of them have also been used in various applications, such as E-commerce and mobile database. This paper proposes two secure receipt oriented encryption systems. The decryptioner's private keys could be changed with the different time periods. This case would be very useful in some practical scenarios, for instance, in a mobile database environment. Besides the semantic security, the proposed schemes have the backward-and-future security, a new security requirement for semantically secure encryption schemes. In terms of construction, the two schemes are based on the pairings over elliptic curves. Also, this paper provides a heuristic security analysis for the underlying system.

    Related items

    Showing items related by title, author, creator and subject.

    • Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
      Salam, M.; Yau, W.; Chin, J.; Heng, S.; Ling, Huo Chong; Phan, R.; Poh, G.; Tan, S.; Yap, W. (2015)
      Ensuring the cloud data security is a major concern for corporate cloud subscribers and in some cases for the private cloud users. Confidentiality of the stored data can be managed by encrypting the data at the client ...
    • The impact of security on VoIP call quality
      Radmand, Pedram; Singh, Jaipal; Talevski, Alex; Domingo, M.; Arnedo, J. (2011)
      Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS. This paper will investigate how end-to-end ...
    • VoIP: making secure calls and maintaining high call quality
      Radmand, Pedram; Singh, Jaipal; Domingo, M.; Arnedo, J.; Talevski, Alex (2010)
      Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS. This paper will investigate how end-to-end ...
    Advanced search

    Browse

    Communities & CollectionsIssue DateAuthorTitleSubjectDocument TypeThis CollectionIssue DateAuthorTitleSubjectDocument Type

    My Account

    Admin

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Follow Curtin

    • 
    • 
    • 
    • 
    • 

    CRICOS Provider Code: 00301JABN: 99 143 842 569TEQSA: PRV12158

    Copyright | Disclaimer | Privacy statement | Accessibility

    Curtin would like to pay respect to the Aboriginal and Torres Strait Islander members of our community by acknowledging the traditional owners of the land on which the Perth campus is located, the Whadjuk people of the Nyungar Nation; and on our Kalgoorlie campus, the Wongutha people of the North-Eastern Goldfields.