A new encryption algorithm over elliptic curve
dc.contributor.author | Han, Song | |
dc.contributor.author | Chang, Elizabeth | |
dc.contributor.author | Liu, Wan-quan | |
dc.contributor.author | Potdar, Vidyasagar | |
dc.contributor.author | Wang, J. | |
dc.date.accessioned | 2017-01-30T14:24:36Z | |
dc.date.available | 2017-01-30T14:24:36Z | |
dc.date.created | 2008-11-12T23:25:02Z | |
dc.date.issued | 2005 | |
dc.identifier.citation | Han, Song and Chang, Elizabeth and Liu, Wan-quan and Potdar, Vidyasagar and Wang, J.. 2005. : A new encryption algorithm over elliptic curve, in Dillon, T. and Yu, X. and Chang, E. (ed), INDIN 2005: 3rd International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business, Aug 10 2005, pp. 675-679. Perth, WA: IEEE. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/38679 | |
dc.identifier.doi | 10.1109/INDIN.2005.1560456 | |
dc.description.abstract |
Various public key encryption systems have been proposed in modern information techology. Some of them have also been used in various applications, such as E-commerce and mobile database. This paper proposes two secure receipt oriented encryption systems. The decryptioner's private keys could be changed with the different time periods. This case would be very useful in some practical scenarios, for instance, in a mobile database environment. Besides the semantic security, the proposed schemes have the backward-and-future security, a new security requirement for semantically secure encryption schemes. In terms of construction, the two schemes are based on the pairings over elliptic curves. Also, this paper provides a heuristic security analysis for the underlying system. | |
dc.publisher | IEEE | |
dc.subject | elliptic curve | |
dc.subject | encryption | |
dc.subject | semantic security | |
dc.subject | security | |
dc.title | A new encryption algorithm over elliptic curve | |
dc.type | Conference Paper | |
dcterms.source.startPage | 675 | |
dcterms.source.endPage | 679 | |
dcterms.source.title | 3rd IEEE International Conference on Industrial Informatics (INDIN 2005) | |
dcterms.source.series | 3rd IEEE International Conference on Industrial Informatics (INDIN 2005) | |
dcterms.source.conference | INDIN 2005: 3rd International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business | |
dcterms.source.conference-start-date | Aug 10 2005 | |
dcterms.source.conferencelocation | Perth, WA | |
dcterms.source.place | Perth, WA | |
curtin.note |
Copyright 2005 IEEE | |
curtin.note |
Reprinted from: | |
curtin.note |
2005 3rd IEEE International Conference on Industrial Informatics (INDIN) Perth, Australia 10-12 August 2005 | |
curtin.note |
IEEE Catalog Number ISBN 05EX1057 | |
curtin.note |
ISBN 0-7803-9094-6 | |
curtin.note |
This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Curtin University of Technology's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. | |
curtin.note |
By choosing to view this document, you agree to all provisions of the copyright laws protecting it. | |
curtin.department | Centre for Extended Enterprises and Business Intelligence | |
curtin.identifier | EPR-548 | |
curtin.accessStatus | Open access | |
curtin.faculty | Curtin Business School | |
curtin.faculty | School of Information Systems |