Selection of Security Elliptic Curve Based on Evolution Algorithm

被引:6
|
作者
Wang, Maocai [1 ,2 ]
Dai, Guangming
Hu, Hanping [1 ]
Pen, Lei [2 ]
机构
[1] Huazhong Univ Sci & Technol, Inst Pattern Recognit & Artificial Intelligence, Wuhan 430074, Peoples R China
[2] China Univ Geosci, Sch Comp, Wuhan 430074, Peoples R China
关键词
Elliptic curve; Selection algorithm; ECDLP; Evolution algorithm; CRYPTOGRAPHY;
D O I
10.1109/CINC.2009.205
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Applying evolution algorithm to selection of security elliptic curve(EC) is first researched in the paper. In order to ensure the security of elliptic curve cryptosystem(ECC), it is necessary that the elliptic curves are safe against all kinds of attack algorithms about the elliptic curve discrete logarithm problem (ECDLP). Therefore, selection of secure elliptic curves is a mathematics difficult problem. In this paper, selection principles of secure EC are firstly analyzed. Then, based on the selection principle, a selection algorithm of security EC based on evolution algorithm is put forward. The thoughts of encoding, crossover and mutation of evolution algorithm for selection of EC are discussed in detail. The implementation result shows the availability and efficiency of the algorithm.
引用
收藏
页码:55 / +
页数:2
相关论文
共 50 条
  • [1] DES Algorithm Security Fortification Using Elliptic Curve Cryptography
    Eldeen, Mohamed A. Seif
    Elkouny, Abdellatif A.
    Elramly, Salwa
    2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 335 - 340
  • [2] Elliptic Curve Signcryption Based Security Protocol for RFID
    Singh, Anuj Kumar
    Patro, B. D. K.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 344 - 365
  • [3] Elliptic-curve-based security processor for RFID
    Lee, Yong Ki
    Sakiyama, Kazuo
    Batina, Lejla
    Verbauwhede, Ingrid
    IEEE TRANSACTIONS ON COMPUTERS, 2008, 57 (11) : 1514 - 1527
  • [4] Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm
    Sudharson, K.
    Arun, S.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03): : 1769 - 1784
  • [5] Security of elliptic curve cryptosystems
    Uchiyama, Shigenori
    NTT R and D, 1999, 48 (10): : 756 - 761
  • [6] A Data Security Algorithm for the Cloud Computing based on Elliptic Curve Functions and Sha3 Signature
    Kotel, Sonia
    Sbiaa, Fatma
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (03) : 458 - 465
  • [7] A security threshold subliminal channel based on elliptic curve cryptosystem
    Xie, Yuhua
    Sun, Xingming
    Xiang, Lingyun
    Luo, Gang
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 294 - 297
  • [8] Based on Elliptic Curve and Combination Chaos Mapping Security System
    Liang, Dongying
    PROCEEDINGS OF 2010 ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2010, : 868 - 872
  • [9] Signature scheme with forward security based on elliptic curve cryptosystem
    Liu, Yali
    Yin, Xinchun
    Zhu, Hong
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 1118 - 1123
  • [10] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Rosheen Qazi
    Kashif Naseer Qureshi
    Faisal Bashir
    Najam Ul Islam
    Saleem Iqbal
    Arsalan Arshad
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 547 - 566