Authenticated public-key encryption based on elliptic curve

  • Yiliang Han*
  • , Xiaoyuan Yang
  • , Yupu Hu
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm ECDSA and achieves both privacy and authenticity in the method of ECDLP which is the most practical cryptographic primitive in the future. The scheme saves 78%-82% computation costs in all. It also saves 14% storage costs for current security parameters and 9% storage costs for high level security in average. The saving is significant potentially, especially in power restricted applications such as embedded systems and mobile computing. Arguments show that the scheme is secure at present. Compared with RFC1421 and existed results, the scheme for multiple users also discussed.

Original languageEnglish
Title of host publicationICESS 2005 - Second International Conference on Embedded Software and Systems
Pages424-431
Number of pages8
DOIs
StatePublished - 2005
Externally publishedYes
EventICESS 2005 - 2nd International Conference on Embedded Software and Systems - Xian, China
Duration: 16 Dec 200518 Dec 2005

Publication series

NameICESS 2005 - Second International Conference on Embedded Software and Systems
Volume2005

Conference

ConferenceICESS 2005 - 2nd International Conference on Embedded Software and Systems
Country/TerritoryChina
CityXian
Period16/12/0518/12/05

Fingerprint

Dive into the research topics of 'Authenticated public-key encryption based on elliptic curve'. Together they form a unique fingerprint.

Cite this