In this paper, we present two explicit invalid-curve attacks on the genus 2 hyperelliptic curve over a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, ...In this paper, we present two explicit invalid-curve attacks on the genus 2 hyperelliptic curve over a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, we discuss the construction of an invalid curve based on the faulted divisor. Our attacks are based on the fact that the Hyperelliptic Curve Scalar Multiplication (HECSM) algorithm does not utilize the curve parameters and We consider three hyperelliptic curves as the attack targets. For curve with security level 186 (in bits), our attack method can get the weakest invalid curve with security level 42 (in bits); there are 93 invalid curves with security level less than 50. We also estimate the theoretical probability of getting a weak hyperelliptic curve whose cardinality is a smooth integer. Finally, we show that the complexity of the fault attack is subexponential if the attacker can freely inject a fault in the input divisor. Cryptosystems based on the genus 2 hyperelliptic curves cannot work against our attack algorithm in practice.展开更多
In this paper, we will use a simple and direct method to obtain some particular solutions of (2+1)- dimensional and (3+ 1)-dimensional KP equation expressed in terms of the Kleinian hyperelliptic functions for a...In this paper, we will use a simple and direct method to obtain some particular solutions of (2+1)- dimensional and (3+ 1)-dimensional KP equation expressed in terms of the Kleinian hyperelliptic functions for a given curve y^2 = f(x) whose genus is three. We observe that this method generalizes the auxiliary method, and can obtain the hyperelliptic functions solutions.展开更多
We generate, from a given basic set of polynomials in several complex variables , new basic sets of polynomials and generated by the application of the Δ and ∇ operators to the set . All relevant ...We generate, from a given basic set of polynomials in several complex variables , new basic sets of polynomials and generated by the application of the Δ and ∇ operators to the set . All relevant properties relating to the effectiveness in Reinhardt and hyperelliptic domains of these new sets are properly deduced. The case of classical orthogonal polynomials is investigated in details and the results are given in a table. Notations are also provided at the end of a table. 展开更多
We compute rational points on real hyperelliptic curves of genus 3 defined on <img src="Edit_ff1a2758-8302-45a6-8c7e-a73bd35f12bd.png" width="20" height="18" alt="" /> who...We compute rational points on real hyperelliptic curves of genus 3 defined on <img src="Edit_ff1a2758-8302-45a6-8c7e-a73bd35f12bd.png" width="20" height="18" alt="" /> whose Jacobian have Mordell-Weil rank <em>r=0</em>. We present an implementation in sagemath of an algorithm which describes the birational transformation of real hyperelliptic curves into imaginary hyperelliptic curves and <span>the Chabauty-Coleman method to find <em>C </em>(<img src="Edit_243e29b4-1b26-469a-9e65-461ffac1e473.png" width="20" height="18" alt="" />)<span></span>. We run the algorithms in</span> Sage on 47 real hyperelliptic curves of genus 3.展开更多
Verifiable delay functions(VDFs)and delay encryptions(DEs)are two important primitives in decentralized systems,while existing constructions are mainly based on time-lock puzzles.A disparate framework has been establi...Verifiable delay functions(VDFs)and delay encryptions(DEs)are two important primitives in decentralized systems,while existing constructions are mainly based on time-lock puzzles.A disparate framework has been established by applying isogenies and pairings on elliptic curves.Following this line,we first employ Richelot isogenies and non-degenerate pairings from hyperelliptic curves for a new verifiable delay function,such that no auxiliary proof and interaction are needed for the verification.Then,we demonstrate that our scheme satisfies all security requirements,in particular,our VDF can resist several attacks,including the latest attacks for SIDH.Besides,resorting to the same techniques,a secure delay encryption from hyperelliptic curves is constructed by modifying Boneh and Frankiln's IBE scheme,which shares the identical setup with our VDF scheme.As far as we know,these schemes are the first cryptographic applications from high-genus isogenies apart from basic protocols,i.e.,hash functions and key exchange protocols.展开更多
A hyperelliptic curve digital signature algorithm (HECDSA) can be viewed as the hyperelliptic curve analogue of the standard digital signature algorithm (DSA). This article discusses divisor evaluations, the basic...A hyperelliptic curve digital signature algorithm (HECDSA) can be viewed as the hyperelliptic curve analogue of the standard digital signature algorithm (DSA). This article discusses divisor evaluations, the basic HECDSA, variants, two HECDSA equations and a 4-tuple HECDSA scheme, and puts forward a generalized equation for HECDSA. From this generalized equation, seven general HECDSA types are derived based on the efficiency requirements. Meanwhile, the securities of these general HECDSA types are analyzed in detail.展开更多
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t...Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.展开更多
In this paper we study the computation of the number of isomorphism classes of hyperelliptic curves of genus 2 over finite fields Fq with q even. We show the formula of the number of isomorphism classes, that is, for ...In this paper we study the computation of the number of isomorphism classes of hyperelliptic curves of genus 2 over finite fields Fq with q even. We show the formula of the number of isomorphism classes, that is, for q = 2m, if 4 (|) m, then the formula is 2q3 + q2 - q;if 4 | m, then the formula is 2q3 + q2 - q + 8. These results can be used in the classification problems and the hyperelliptic curve cryptosystems.展开更多
In Ref.[2] the author dealt with the Main conjecture on geometric codes andproved the correctness of the conjecture for codes arising from curves with genus 1 or2 when the cardinal of the ground field is large enough....In Ref.[2] the author dealt with the Main conjecture on geometric codes andproved the correctness of the conjecture for codes arising from curves with genus 1 or2 when the cardinal of the ground field is large enough. In this note, the conjecturefor codes from hyperelliptic curves is attacked.展开更多
This paper is devoted to counting the number of isomorphism classes of pointed hyperelliptic curves over finite fields. We deal with the genus 4 case and the finite fields are of even characteristics. The number of is...This paper is devoted to counting the number of isomorphism classes of pointed hyperelliptic curves over finite fields. We deal with the genus 4 case and the finite fields are of even characteristics. The number of isomorphism classes is computed and the explicit formulae are given. This number can be represented as a polynomial in q of degree 7, where q is the order of the finite field. The result can be used in the classification problems and it is useful for further studies of hyperelliptic curve cryptosystems, e.g. it is of interest for research on implementing the arithmetics of curves of low genus for cryptographic purposes. It could also be of interest for point counting problems; both on moduli spaces of curves, and on finding the maximal number of points that a pointed hyperelliptic curve over a given finite field may have.展开更多
Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unn...Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-relatedprocesses to attain more profits. However, such IoT based smart industriesneed internet connectivity and interoperability which makes them susceptibleto numerous cyber-attacks due to the scarcity of computational resourcesof IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoTenvironment. In this paper, we propose a hyperelliptic curve cryptography(HECC) based IIoT Certificateless Signcryption (IIoT-CS) scheme, with theaim of improving security while lowering computational and communicationoverhead in IIoT environment. HECC with 80-bit smaller key and parameterssizes offers similar security as elliptic curve cryptography (ECC) with 160-bitlong key and parameters sizes. We assessed the IIoT-CS scheme security byapplying formal and informal security evaluation techniques. We used Realor Random (RoR) model and the widely used automated validation of internet security protocols and applications (AVISPA) simulation tool for formalsecurity analysis and proved that the IIoT-CS scheme provides resistance tovarious attacks. Our proposed IIoT-CS scheme is relatively less expensivecompared to the current state-of-the-art in terms of computational cost andcommunication overhead. Furthermore, the IIoT-CS scheme is 31.25% and 51.31% more efficient in computational cost and communication overhead,respectively, compared to the most recent protocol.展开更多
In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme...In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system展开更多
Recent years have witnessed growing scientific research interest in the Internet of Things(IoT)technologies,which supports the development of a variety of applications such as health care,Industry 4.0,agriculture,ecol...Recent years have witnessed growing scientific research interest in the Internet of Things(IoT)technologies,which supports the development of a variety of applications such as health care,Industry 4.0,agriculture,ecological data management,and other various domains.IoT utilizes the Internet as a prime medium of communication for both single documents as well as multi-digital messages.However,due to the wide-open nature of the Internet,it is important to ensure the anonymity,untraceably,confidentiality,and unforgeability of communication with efficient computational complexity and low bandwidth.We designed a light weight and secure proxy blind signcryption for multi-digital messages based on a hyperelliptic curve(HEC).Our results outperform the available schemes in terms of computational cost and communication bandwidth.The designed scheme also has the desired authentication,unforgeability of warrants and/or plaintext,confidentiality,integrity,and blindness,respectively.Further,our scheme is more suitable for devices with low computation power such as mobiles and tablets.展开更多
Following the basic principles stated by Painlevé, we first revisit the process of selecting the admissible time-independent Hamiltonians H = (p1^2 + p2^2)/2 + V(q1, q2) whose some integer power qj^nj (t)...Following the basic principles stated by Painlevé, we first revisit the process of selecting the admissible time-independent Hamiltonians H = (p1^2 + p2^2)/2 + V(q1, q2) whose some integer power qj^nj (t) of the general solution is a singlevalued function of the complez time t. In addition to the well known rational potentials V of Hénon-Heiles, this selects possible cases with a trigonometric dependence of V on qj. Then, by establishing the relevant confluences, we restrict the question of the explicit integration of the seven (three “cubic” plus four “quartic”) rational Hénon-Heiles cases to the quartic cases. Finally, we perform the explicit integration of the quartic cases, thus proving that the seven rational cases have a meromorphic general solution explicitly given by a genus two hyperelliptic function.展开更多
In the’recent decade, one-way functions have very. important applications in cryptograpy, especially in public key systems and generators of pseudorandom number. In fact, modem cryptograph is developed based on the a...In the’recent decade, one-way functions have very. important applications in cryptograpy, especially in public key systems and generators of pseudorandom number. In fact, modem cryptograph is developed based on the assumption of the existence of oneway function. A one-way function which is also a permutation is called a one-way permutation.展开更多
基金supported by the National Basic Research Program (973 Program)under Grant No.2013CB834205 the National Natural Science Foundation of China under Grant No.61272035 the Independent Innovation Foundation of Shandong University under Grant No.2012JC020
文摘In this paper, we present two explicit invalid-curve attacks on the genus 2 hyperelliptic curve over a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, we discuss the construction of an invalid curve based on the faulted divisor. Our attacks are based on the fact that the Hyperelliptic Curve Scalar Multiplication (HECSM) algorithm does not utilize the curve parameters and We consider three hyperelliptic curves as the attack targets. For curve with security level 186 (in bits), our attack method can get the weakest invalid curve with security level 42 (in bits); there are 93 invalid curves with security level less than 50. We also estimate the theoretical probability of getting a weak hyperelliptic curve whose cardinality is a smooth integer. Finally, we show that the complexity of the fault attack is subexponential if the attacker can freely inject a fault in the input divisor. Cryptosystems based on the genus 2 hyperelliptic curves cannot work against our attack algorithm in practice.
基金Supported by the National Key Basic Research Project of China under Grant No. 2004CB318000
文摘In this paper, we will use a simple and direct method to obtain some particular solutions of (2+1)- dimensional and (3+ 1)-dimensional KP equation expressed in terms of the Kleinian hyperelliptic functions for a given curve y^2 = f(x) whose genus is three. We observe that this method generalizes the auxiliary method, and can obtain the hyperelliptic functions solutions.
文摘We generate, from a given basic set of polynomials in several complex variables , new basic sets of polynomials and generated by the application of the Δ and ∇ operators to the set . All relevant properties relating to the effectiveness in Reinhardt and hyperelliptic domains of these new sets are properly deduced. The case of classical orthogonal polynomials is investigated in details and the results are given in a table. Notations are also provided at the end of a table.
文摘We compute rational points on real hyperelliptic curves of genus 3 defined on <img src="Edit_ff1a2758-8302-45a6-8c7e-a73bd35f12bd.png" width="20" height="18" alt="" /> whose Jacobian have Mordell-Weil rank <em>r=0</em>. We present an implementation in sagemath of an algorithm which describes the birational transformation of real hyperelliptic curves into imaginary hyperelliptic curves and <span>the Chabauty-Coleman method to find <em>C </em>(<img src="Edit_243e29b4-1b26-469a-9e65-461ffac1e473.png" width="20" height="18" alt="" />)<span></span>. We run the algorithms in</span> Sage on 47 real hyperelliptic curves of genus 3.
基金supported by the National Natural Science Foundation of China(No.62272491)the Guangdong Major Project of Basic and Applied Basic Research(2019B030302008)the National R&D Key Program of China under Grant(2022YFB2701500).
文摘Verifiable delay functions(VDFs)and delay encryptions(DEs)are two important primitives in decentralized systems,while existing constructions are mainly based on time-lock puzzles.A disparate framework has been established by applying isogenies and pairings on elliptic curves.Following this line,we first employ Richelot isogenies and non-degenerate pairings from hyperelliptic curves for a new verifiable delay function,such that no auxiliary proof and interaction are needed for the verification.Then,we demonstrate that our scheme satisfies all security requirements,in particular,our VDF can resist several attacks,including the latest attacks for SIDH.Besides,resorting to the same techniques,a secure delay encryption from hyperelliptic curves is constructed by modifying Boneh and Frankiln's IBE scheme,which shares the identical setup with our VDF scheme.As far as we know,these schemes are the first cryptographic applications from high-genus isogenies apart from basic protocols,i.e.,hash functions and key exchange protocols.
基金supported by the National Natural Science Foundation of China (60763009)the Science and Technology Key Project of the Ministry of Education of China (207089)Zhejiang Natural Science Foundation of Outstanding Youth Team Project (R1090138)
文摘A hyperelliptic curve digital signature algorithm (HECDSA) can be viewed as the hyperelliptic curve analogue of the standard digital signature algorithm (DSA). This article discusses divisor evaluations, the basic HECDSA, variants, two HECDSA equations and a 4-tuple HECDSA scheme, and puts forward a generalized equation for HECDSA. From this generalized equation, seven general HECDSA types are derived based on the efficiency requirements. Meanwhile, the securities of these general HECDSA types are analyzed in detail.
文摘Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.
基金supported by the National Natural Science Foundation of China(Grant Nos.10501049&90304012)973 Project(Grant No.2004CB318000).
文摘In this paper we study the computation of the number of isomorphism classes of hyperelliptic curves of genus 2 over finite fields Fq with q even. We show the formula of the number of isomorphism classes, that is, for q = 2m, if 4 (|) m, then the formula is 2q3 + q2 - q;if 4 | m, then the formula is 2q3 + q2 - q + 8. These results can be used in the classification problems and the hyperelliptic curve cryptosystems.
文摘In Ref.[2] the author dealt with the Main conjecture on geometric codes andproved the correctness of the conjecture for codes arising from curves with genus 1 or2 when the cardinal of the ground field is large enough. In this note, the conjecturefor codes from hyperelliptic curves is attacked.
基金supported by National Natural Science Foundation of China (Grant Nos. 10501049,60821002)973 Project (Grant No. 2004CB318000)
文摘This paper is devoted to counting the number of isomorphism classes of pointed hyperelliptic curves over finite fields. We deal with the genus 4 case and the finite fields are of even characteristics. The number of isomorphism classes is computed and the explicit formulae are given. This number can be represented as a polynomial in q of degree 7, where q is the order of the finite field. The result can be used in the classification problems and it is useful for further studies of hyperelliptic curve cryptosystems, e.g. it is of interest for research on implementing the arithmetics of curves of low genus for cryptographic purposes. It could also be of interest for point counting problems; both on moduli spaces of curves, and on finding the maximal number of points that a pointed hyperelliptic curve over a given finite field may have.
基金This work is supported by the University of Malaya IIRG Grant(IIRG008A-19IISSN),Ministry of Education FRGS Grant(FP055-2019A)This work was also supported by Grant System of University of Zilina No.1/2020.(Project No.7962)partially supported by the Slovak Grant Agency for Science(VEGA)under Grant Number 1/0157/21.The authors are grateful to the Taif University Researchers Supporting Project(Number TURSP-2020/36),Taif University,Taif,Saudi Arabia.
文摘Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-relatedprocesses to attain more profits. However, such IoT based smart industriesneed internet connectivity and interoperability which makes them susceptibleto numerous cyber-attacks due to the scarcity of computational resourcesof IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoTenvironment. In this paper, we propose a hyperelliptic curve cryptography(HECC) based IIoT Certificateless Signcryption (IIoT-CS) scheme, with theaim of improving security while lowering computational and communicationoverhead in IIoT environment. HECC with 80-bit smaller key and parameterssizes offers similar security as elliptic curve cryptography (ECC) with 160-bitlong key and parameters sizes. We assessed the IIoT-CS scheme security byapplying formal and informal security evaluation techniques. We used Realor Random (RoR) model and the widely used automated validation of internet security protocols and applications (AVISPA) simulation tool for formalsecurity analysis and proved that the IIoT-CS scheme provides resistance tovarious attacks. Our proposed IIoT-CS scheme is relatively less expensivecompared to the current state-of-the-art in terms of computational cost andcommunication overhead. Furthermore, the IIoT-CS scheme is 31.25% and 51.31% more efficient in computational cost and communication overhead,respectively, compared to the most recent protocol.
基金This work was supported in part by the National Science Foundation Project of P.R.China,the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-14-046A2
文摘In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system
文摘Recent years have witnessed growing scientific research interest in the Internet of Things(IoT)technologies,which supports the development of a variety of applications such as health care,Industry 4.0,agriculture,ecological data management,and other various domains.IoT utilizes the Internet as a prime medium of communication for both single documents as well as multi-digital messages.However,due to the wide-open nature of the Internet,it is important to ensure the anonymity,untraceably,confidentiality,and unforgeability of communication with efficient computational complexity and low bandwidth.We designed a light weight and secure proxy blind signcryption for multi-digital messages based on a hyperelliptic curve(HEC).Our results outperform the available schemes in terms of computational cost and communication bandwidth.The designed scheme also has the desired authentication,unforgeability of warrants and/or plaintext,confidentiality,integrity,and blindness,respectively.Further,our scheme is more suitable for devices with low computation power such as mobiles and tablets.
文摘Following the basic principles stated by Painlevé, we first revisit the process of selecting the admissible time-independent Hamiltonians H = (p1^2 + p2^2)/2 + V(q1, q2) whose some integer power qj^nj (t) of the general solution is a singlevalued function of the complez time t. In addition to the well known rational potentials V of Hénon-Heiles, this selects possible cases with a trigonometric dependence of V on qj. Then, by establishing the relevant confluences, we restrict the question of the explicit integration of the seven (three “cubic” plus four “quartic”) rational Hénon-Heiles cases to the quartic cases. Finally, we perform the explicit integration of the quartic cases, thus proving that the seven rational cases have a meromorphic general solution explicitly given by a genus two hyperelliptic function.
文摘In the’recent decade, one-way functions have very. important applications in cryptograpy, especially in public key systems and generators of pseudorandom number. In fact, modem cryptograph is developed based on the assumption of the existence of oneway function. A one-way function which is also a permutation is called a one-way permutation.