CRYPTOGRAPHY BASED ON CURVES (ELLIPTIC AND HYPERELLIPTIC)

被引:0
|
作者
Durcheva, Mariana [1 ]
机构
[1] Tech Univ Sofia, Fac Appl Math & Informat, Dept Algebra & Geometry, Sofia, Bulgaria
关键词
elliptic curve; hyperelliptic curve; cryptographic protocol;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we present an ElGamal-like cryptosystem, based on elliptic and hyperelliptic curves, in which we combine the advantages of both curves. The main idea is to use the isogenies between the Weil restriction of the elliptic curve and the Jacobian of the genus-2 hyperelliptic curve.
引用
收藏
页码:33 / 44
页数:12
相关论文
共 50 条
  • [1] Hyperelliptic curves and cryptography
    Jacobson, M
    Menezes, A
    Stein, A
    [J]. HIGH PRIMES AND MISDEMEANOURS: LECTURES IN HONOUR OF THE 60TH BIRTHDAY OF HUGH COWIE WILLIAMS, 2004, 41 : 255 - 282
  • [2] Elliptic subcovers of hyperelliptic curves
    Kani, Ernst
    [J]. MATHEMATISCHE NACHRICHTEN, 2017, 290 (17-18) : 2890 - 2900
  • [3] Elliptic curves and cryptography
    Silverman, JH
    [J]. Public-Key Cryptography, 2005, 62 : 91 - 112
  • [4] Elliptic curves and cryptography
    Jurisic, A
    Menezes, AJ
    [J]. DR DOBBS JOURNAL, 1997, 22 (04): : 26 - +
  • [5] Elliptic Curves Suitable for Pairing Based Cryptography
    Friederike Brezing
    Annegret Weng
    [J]. Designs, Codes and Cryptography, 2005, 37 : 133 - 141
  • [6] Elliptic curves suitable for pairing based cryptography
    Brezing, F
    Weng, AG
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2005, 37 (01) : 133 - 141
  • [7] Pairing-Based Cryptography on Elliptic Curves
    Miret, Josep M.
    Sadornil, Daniel
    Tena, Juan G.
    [J]. MATHEMATICS IN COMPUTER SCIENCE, 2018, 12 (03) : 309 - 318
  • [8] ON A CHARACTERIZATION OF ELLIPTIC-HYPERELLIPTIC CURVES
    DELCENTINA, A
    RECILLAS, S
    [J]. JOURNAL FUR DIE REINE UND ANGEWANDTE MATHEMATIK, 1987, 380 : 166 - 170
  • [9] Rational points on elliptic and hyperelliptic curves
    Bhargava, Manjul
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONGRESS OF MATHEMATICIANS (ICM 2014), VOL I, 2014, : 657 - 684
  • [10] Study on elliptic curves in cryptography
    Eier, R.
    [J]. ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2005, 122 (1-2): : 7 - 27