期刊文献+

一种高效安全的椭圆曲线标量乘算法 被引量:8

An Efficient Secure Elliptic Curve Scalar Multiplication Algorithm
在线阅读 下载PDF
导出
摘要 基于点验证和基于一致性检测的椭圆曲线标量乘安全算法一般运算效率低下。为此,通过对错误探测方法进行改进,提出一种基于三进制的椭圆曲线标量乘算法,给出算法的正确性证明,并在仿射坐标和Jacobian坐标下对其进行分析,结果表明,在保证安全性的前提下,该算法的效率有较大提高。 Most secure Elliptic Curve Scalar Multiplication(ECSM) algorithms based on Point Verification(PV) and Coherency Check(CC) have low efficiency.Aiming at the problem,this paper proposes a new secure algorithm based on ternary representation and proves its correctness.The analysis about its efficiency in the affine coordinates and Jacobian coordinates is presented,whose result shows that the computational efficiency is improved while guaranteeing the security.
作者 陈熹 祝跃飞
出处 《计算机工程》 CAS CSCD 2012年第18期103-106,共4页 Computer Engineering
基金 郑州市科技创新团队基金资助项目(10CXTD150)
关键词 点验证 一致性检测 椭圆曲线标量乘 错误分析攻击 三进制表示 仿射坐标 Jacobian坐标 Point Verification(PV); Coherency Check(CC); Elliptic Curve Scalar Multiplication(ECSM); fault analysis attack; ternary representation; affine coordinates; Jacobian coordinates
  • 相关文献

参考文献15

  • 1Koblitz N. Elliptic Curve Cryptosystems[J]. Mathematics of Computation, 1987, 48(177): 203-209.
  • 2Miller V S. Use of Elliptic Curves in Cryptography[C]//Proc. of CRYPTO’85. [S. l.]: Springer-Verlag, 1986: 417-426.
  • 3刘铎,戴一奇.计算椭圆曲线上多标量乘的快速算法[J].计算机学报,2008,31(7):1131-1137. 被引量:17
  • 4陈厚友,马传贵.椭圆曲线密码中一种多标量乘算法[J].软件学报,2011,22(4):782-788. 被引量:11
  • 5Kocher P. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other System[C]//Proc. of CRYPTO’96. [S. l.]: Springer-Verlag, 1996: 104-113.
  • 6Kocher P, Jaffe J, Jun Benjamin. Differential Power Analysis[C]// Proc. of CRYPTO’99. [S. l.]: Springer-Verlag, 1999: 388-397.
  • 7Jean-Sebastien C. Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems[C]//Proc. of CHES’99. [S. l.]: Springer-Verlag, 1999: 292-302.
  • 8Antipa A, Brown D R L, Menezes A, et al. Validation of Elliptic Curve Public Keys[C]//Proc. of PKC’03. [S. l.]: Springer-Verlag, 2003: 211-233.
  • 9Biehl I, Meyer B, Muller V. Differential Fault Attacks on Elliptic Curve Cryptosystems[C]//Proc. of CRYPTO’00. [S. l.]: Springer- Verlag, 2000: 131-146.
  • 10Ciet M, Joye M. Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults[J]. Designs, Codes and Cryptography, 2005, 36(1): 33-43.

二级参考文献15

  • 1Tzer-ShyongChen,Kuo-HsuanHuang,Yu-FangChung.Digital Multi-Signature Scheme Based on the Elliptic Curve Cryptosystem[J].Journal of Computer Science & Technology,2004,19(4):570-572. 被引量:11
  • 2石润华,钟诚.一种快速的椭圆曲线标量乘方法[J].计算机工程与应用,2006,42(2):156-158. 被引量:9
  • 3张亚娟,祝跃飞,况百杰.整数对的低重量表示JSF_3(英文)[J].软件学报,2006,17(9):2004-2012. 被引量:4
  • 4Koblitz N. Elliptic curve cryptosystems. Mathematics of computation, 1987, 48:203-209.
  • 5Miller V. Uses of elliptic curve in cryptography//Proceed- ings of the CRYPTO'85, LNCS218. New York: Springer Verlag, 1986:417-426.
  • 6Silverman H. The Arithmetic of Elliptic Curves. GTM106. New York: Springer-Verlag, 1986.
  • 7Institute of Electrical and Electronics, Inc. IEEE P1363/D9 Standard specifications for public-key cryptography. New York, USA, 2001.
  • 8Chen T-S, Huang K-H, Chung Yu-Fang. Digital multi-signature scheme based on the elliptic curve eryptosystem. Journal of Computer Science and Technology, 19(4) : 57-insicle back cover.
  • 9Menexes A J, Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. Boca Raton: CRC Press, c1997.
  • 10Lim C H, Lee P J. More flexible exponentiation with precomputation//Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology, LNCS389. New York: Springer Verlag, 1994: 95-107.

共引文献24

同被引文献57

引证文献8

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部