期刊文献+

Evolutionary Cryptography Theory-Based Generating Method for Secure ECs 被引量:3

Evolutionary Cryptography Theory-Based Generating Method for Secure ECs
原文传递
导出
摘要 Ant Colony Optimization (AGO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly based on pure mathematical methods which have complicated theories and algorithm. It seems that there is no relationship between cryptography and ACO. Actually, some problems in cryptography are due to optimization grouping problems that could be improved using an evolutionary algorithm. Therefore, this paper presents a new method of solving secure curve selection problems using ACO. We improved Complex Multiplication (CM) by combining Evolutionary Cryptography Theory with Weber polynomial solutions. We found that ACO makes full use of valid information generated from factorization and allocates computing resource reasonably. It greatly increases the performance of Weber polynomial solutions. Compared with traditional CM, which can only search one root once time, our new method searches all roots of the polynomial once, and the average time needed to search for one root reduces rapidly. The more roots are searched, the more ECs are obtained. Ant Colony Optimization (AGO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly based on pure mathematical methods which have complicated theories and algorithm. It seems that there is no relationship between cryptography and ACO. Actually, some problems in cryptography are due to optimization grouping problems that could be improved using an evolutionary algorithm. Therefore, this paper presents a new method of solving secure curve selection problems using ACO. We improved Complex Multiplication (CM) by combining Evolutionary Cryptography Theory with Weber polynomial solutions. We found that ACO makes full use of valid information generated from factorization and allocates computing resource reasonably. It greatly increases the performance of Weber polynomial solutions. Compared with traditional CM, which can only search one root once time, our new method searches all roots of the polynomial once, and the average time needed to search for one root reduces rapidly. The more roots are searched, the more ECs are obtained.
作者 Chao Wang Feng Hu Huanguo Zhang Jie Wu Chao Wang Feng Hu Huanguo Zhang Jie Wu
出处 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第5期499-510,共12页 清华大学学报(自然科学版(英文版)
基金 supported by the National Natural Science Foundation of China (Nos.61332019, 61572304, 61272056, and 60970006) the Innovation Grant of Shanghai Municipal Education Commission (No.14ZZ089) Shanghai Key Laboratory of Specialty Fiber Optics and Optical Access Networks (No.SKLSFO2014-06)
关键词 ECS Weber polynomial evolutionary algorithm ant algorithm complex multiplication ECs Weber polynomial evolutionary algorithm ant algorithm complex multiplication
  • 相关文献

参考文献5

二级参考文献33

  • 1HAO Liang1,LIU Dan2 & LONG GuiLu1,3 1Key Laboratory for Atomic and Molecular NanoSciences and Department of Physics,Tsinghua University,Beijing 100084,China,2School of Sciences,Dalian Nationalities University,Dalian 116600,China,3Tsinghua National Laboratory for Information Science and Technology,Beijing 100084,China.An N/4 fixed-point duality quantum search algorithm[J].Science China(Physics,Mechanics & Astronomy),2010,53(9):1765-1768. 被引量:8
  • 2龙桂鲁,李岩松,肖丽,屠长存,孙扬.Grover量子搜索算法及改进[J].原子核物理评论,2004,21(2):114-116. 被引量:18
  • 3孟庆树,张焕国,王张宜,覃中平,彭文灵.Bent函数的演化设计[J].电子学报,2004,32(11):1901-1903. 被引量:16
  • 4MENG QingShu,ZHANG HuanGuo,YANG Min,WANG ZhangYi.Analysis of affinely equivalent Boolean functions[J].Science in China(Series F),2007,50(3):299-306. 被引量:5
  • 5康立山.演化计算[M].北京:清华大学出版社,1999..
  • 6王育民.通信网的安全技术与理论[M].西安:西安电子科技大学出版社,1999..
  • 7KOBLITZ N. Elliptic Curve CryptosystemsJJ]. Mathematics of Computing American Mathematical Society, 1987(48): 203-309.
  • 8MILLER V S. Use of Elliptic Curves in Cryptography[C]// International Association for Cryptologic Research (IACR). Advances in Cryptology-CRYPTO' 85, August 18-22, 1985, Santa Barbara, California, USA. Berlin: Springer, 1986: 417-426.
  • 9QUISQUATER J j, SAMYDE D. Electromagnetic Analysis (EMA): Measures and Counter Measures for Smart Cards[C]//The Java Card Forum, Eurosmart and INRIA. Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, September 19-21, 2001, Cannes, France. Berlin: Springer, 2001: 200- 91B.
  • 10PADE D. Theoretical Use of Cache Memory as a Cryptanalytic Side- channel[R]. Bristol: Department of Computer Science, University of Bristol, Technical Report CSTR-02-003, 2002.

共引文献51

同被引文献37

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部