Selection of Security Elliptic Curve Based on Evolution Algorithm

被引:6
|
作者
Wang, Maocai [1 ,2 ]
Dai, Guangming
Hu, Hanping [1 ]
Pen, Lei [2 ]
机构
[1] Huazhong Univ Sci & Technol, Inst Pattern Recognit & Artificial Intelligence, Wuhan 430074, Peoples R China
[2] China Univ Geosci, Sch Comp, Wuhan 430074, Peoples R China
关键词
Elliptic curve; Selection algorithm; ECDLP; Evolution algorithm; CRYPTOGRAPHY;
D O I
10.1109/CINC.2009.205
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Applying evolution algorithm to selection of security elliptic curve(EC) is first researched in the paper. In order to ensure the security of elliptic curve cryptosystem(ECC), it is necessary that the elliptic curves are safe against all kinds of attack algorithms about the elliptic curve discrete logarithm problem (ECDLP). Therefore, selection of secure elliptic curves is a mathematics difficult problem. In this paper, selection principles of secure EC are firstly analyzed. Then, based on the selection principle, a selection algorithm of security EC based on evolution algorithm is put forward. The thoughts of encoding, crossover and mutation of evolution algorithm for selection of EC are discussed in detail. The implementation result shows the availability and efficiency of the algorithm.
引用
收藏
页码:55 / +
页数:2
相关论文
共 50 条
  • [31] An elliptic curve backdoor algorithm for RSASSA
    Young, Adam
    Yung, Moti
    INFORMATION HIDING, 2007, 4437 : 355 - 374
  • [32] An Improved Algorithm of Elliptic Curve Cryptograph
    Zhang, Kai
    Yan, Tao
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 237 - 248
  • [33] A Spectral Wavelength Selection Algorithm Based on RMSECV Curve
    Zhou Yan
    Cao Hui
    Ju Lin-cang
    SPECTROSCOPY AND SPECTRAL ANALYSIS, 2011, 31 (02) : 492 - 495
  • [34] Development of security scheme on wireless sensor network based on Elliptic Curve Cryptography
    Li, Dongmei
    Liu, Yan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMMERCE AND SOCIETY, 2015, 17 : 630 - 634
  • [35] A security enhanced password authentication and update scheme based on elliptic curve cryptography
    Qiao, Pengshuai
    Tu, Hang
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (02) : 130 - 139
  • [36] Hyper Elliptic Curve Based Homomorphic Encryption Scheme for Cloud Data Security
    Selvi, S.
    Gobi, M.
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 71 - 78
  • [37] A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
    Adeniyi, Abidemi Emmanuel
    Jimoh, Rasheed Gbenga
    Awotunde, Joseph Bamidele
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118
  • [38] A network security protection scheme for tax system based on elliptic curve cryptography
    Wang, Wenjie
    Ni, Guofeng
    Yang, Yancheng
    Hu, Ying
    Gao, Meiling
    Shankar, Achyut
    ALEXANDRIA ENGINEERING JOURNAL, 2024, 109 : 925 - 934
  • [39] Security Enhancement of Joint Procedure Based on Improved Elliptic Curve Cryptography in LoRaWAN
    Sujatha, R.
    Radovic, Vesela
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (03) : 1471 - 1487
  • [40] An Efficient Mobile Voting System Security Scheme based on Elliptic Curve Cryptography
    Ahmad, Tohari
    Hu, Jiankun
    Han, Song
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 474 - +