期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
Fault Attacks on Hyperelliptic Curve Discrete Logarithm Problem over Finite Fields 被引量:2
1
作者 Wang Mingqiang Xue Haiyang Zhan Tao 《China Communications》 SCIE CSCD 2012年第11期150-161,共12页
In this paper, we present two explicit invalid-curve attacks on the genus 2 hyperelliptic curve over a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, ... In this paper, we present two explicit invalid-curve attacks on the genus 2 hyperelliptic curve over a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, we discuss the construction of an invalid curve based on the faulted divisor. Our attacks are based on the fact that the Hyperelliptic Curve Scalar Multiplication (HECSM) algorithm does not utilize the curve parameters and We consider three hyperelliptic curves as the attack targets. For curve with security level 186 (in bits), our attack method can get the weakest invalid curve with security level 42 (in bits); there are 93 invalid curves with security level less than 50. We also estimate the theoretical probability of getting a weak hyperelliptic curve whose cardinality is a smooth integer. Finally, we show that the complexity of the fault attack is subexponential if the attacker can freely inject a fault in the input divisor. Cryptosystems based on the genus 2 hyperelliptic curves cannot work against our attack algorithm in practice. 展开更多
关键词 hyperelliptic curve discrete logarithm finite field GENUS CRYPTOSYSTEM
下载PDF
Hyperelliptic Function Solutions of Three Genus for KP Equation Using Direct Method
2
作者 冯阳 丁琦 +1 位作者 董彦诚 张鸿庆 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第4期615-618,共4页
In this paper, we will use a simple and direct method to obtain some particular solutions of (2+1)- dimensional and (3+ 1)-dimensional KP equation expressed in terms of the Kleinian hyperelliptic functions for a... In this paper, we will use a simple and direct method to obtain some particular solutions of (2+1)- dimensional and (3+ 1)-dimensional KP equation expressed in terms of the Kleinian hyperelliptic functions for a given curve y^2 = f(x) whose genus is three. We observe that this method generalizes the auxiliary method, and can obtain the hyperelliptic functions solutions. 展开更多
关键词 hyperelliptic functions (2+1)-dimensional KP equation (3+1)-dimensional KP equation
下载PDF
Forward (Δ) and Backward (∇) Difference Operators Basic Sets of Polynomials in and Their Effectiveness in Reinhardt and Hyperelliptic Domains
3
作者 Saheed Abayomi Akinbode Aderibigbe Sheudeen Anjorin 《Journal of Applied Mathematics and Physics》 2016年第8期1630-1642,共13页
We generate, from a given basic set of polynomials in several complex variables , new basic sets of polynomials and generated by the application of the Δ and &#8711  operators to the set . All relevant ... We generate, from a given basic set of polynomials in several complex variables , new basic sets of polynomials and generated by the application of the Δ and &#8711  operators to the set . All relevant properties relating to the effectiveness in Reinhardt and hyperelliptic domains of these new sets are properly deduced. The case of classical orthogonal polynomials is investigated in details and the results are given in a table. Notations are also provided at the end of a table.  展开更多
关键词 EFFECTIVENESS Cannon Condition Cannon Sum Cannon Function Reinhardt Domain hyperelliptic Domain
下载PDF
Rational Points on Genus 3 Real Hyperelliptic Curves
4
作者 Brice M. Miayoka Regis F. Babindamana Basile G. R. Bossoto 《Open Journal of Discrete Mathematics》 2021年第4期103-113,共11页
We compute rational points on real hyperelliptic curves of genus 3 defined on <img src="Edit_ff1a2758-8302-45a6-8c7e-a73bd35f12bd.png" width="20" height="18" alt="" /> who... We compute rational points on real hyperelliptic curves of genus 3 defined on <img src="Edit_ff1a2758-8302-45a6-8c7e-a73bd35f12bd.png" width="20" height="18" alt="" /> whose Jacobian have Mordell-Weil rank <em>r=0</em>. We present an implementation in sagemath of an algorithm which describes the birational transformation of real hyperelliptic curves into imaginary hyperelliptic curves and <span>the Chabauty-Coleman method to find <em>C </em>(<img src="Edit_243e29b4-1b26-469a-9e65-461ffac1e473.png" width="20" height="18" alt="" />)<span></span>. We run the algorithms in</span> Sage on 47 real hyperelliptic curves of genus 3. 展开更多
关键词 hyperelliptic Curve JACOBIAN Coleman Integration Rational Point
下载PDF
Verifiable delay functions and delay encryptions from hyperelliptic curves
5
作者 Chao Chen Fangguo Zhang 《Cybersecurity》 EI CSCD 2024年第4期110-121,共12页
Verifiable delay functions(VDFs)and delay encryptions(DEs)are two important primitives in decentralized systems,while existing constructions are mainly based on time-lock puzzles.A disparate framework has been establi... Verifiable delay functions(VDFs)and delay encryptions(DEs)are two important primitives in decentralized systems,while existing constructions are mainly based on time-lock puzzles.A disparate framework has been established by applying isogenies and pairings on elliptic curves.Following this line,we first employ Richelot isogenies and non-degenerate pairings from hyperelliptic curves for a new verifiable delay function,such that no auxiliary proof and interaction are needed for the verification.Then,we demonstrate that our scheme satisfies all security requirements,in particular,our VDF can resist several attacks,including the latest attacks for SIDH.Besides,resorting to the same techniques,a secure delay encryption from hyperelliptic curves is constructed by modifying Boneh and Frankiln's IBE scheme,which shares the identical setup with our VDF scheme.As far as we know,these schemes are the first cryptographic applications from high-genus isogenies apart from basic protocols,i.e.,hash functions and key exchange protocols. 展开更多
关键词 Verifiable delay functions Delay encryptions hyperelliptic curves Richelot isogenies PAIRINGS
原文传递
Effective generalized equations of secure hyperelliptic curve digital signature algorithms 被引量:7
6
作者 YOU Lin ,SANG Yong-xuan College of Communication Engineering,Hangzhou Dianzi University,Hangzhou 310018,China 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2010年第2期100-108,115,共10页
A hyperelliptic curve digital signature algorithm (HECDSA) can be viewed as the hyperelliptic curve analogue of the standard digital signature algorithm (DSA). This article discusses divisor evaluations, the basic... A hyperelliptic curve digital signature algorithm (HECDSA) can be viewed as the hyperelliptic curve analogue of the standard digital signature algorithm (DSA). This article discusses divisor evaluations, the basic HECDSA, variants, two HECDSA equations and a 4-tuple HECDSA scheme, and puts forward a generalized equation for HECDSA. From this generalized equation, seven general HECDSA types are derived based on the efficiency requirements. Meanwhile, the securities of these general HECDSA types are analyzed in detail. 展开更多
关键词 hyperelliptic curve digital signature algorithm generalized equation hyperelliptic curve discrete logarithm problem
原文传递
Securing the Internet of Health Things with Certificateless Anonymous Authentication Scheme
7
作者 Nisreen Innab 《Computers, Materials & Continua》 SCIE EI 2024年第8期2237-2258,共22页
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t... Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes. 展开更多
关键词 Internet of things internet of health things security authentication hyperelliptic curve cryptography
下载PDF
Isomorphism classes of hyperelliptic curves of genus 2 over finite fields with characteristic 2 被引量:5
8
作者 DENG Yingpu LIU Mulan 《Science China Mathematics》 SCIE 2006年第2期173-184,共12页
In this paper we study the computation of the number of isomorphism classes of hyperelliptic curves of genus 2 over finite fields Fq with q even. We show the formula of the number of isomorphism classes, that is, for ... In this paper we study the computation of the number of isomorphism classes of hyperelliptic curves of genus 2 over finite fields Fq with q even. We show the formula of the number of isomorphism classes, that is, for q = 2m, if 4 (|) m, then the formula is 2q3 + q2 - q;if 4 | m, then the formula is 2q3 + q2 - q + 8. These results can be used in the classification problems and the hyperelliptic curve cryptosystems. 展开更多
关键词 hyperelliptic CURVES hyperelliptic curve CRYPTOSYSTEMS JACOBIAN GROUPS ISOMORPHISM classes.
原文传递
Families of hyperelliptic curves with maximal slopes 被引量:2
9
作者 LIU XiaoLei TAN ShengLi 《Science China Mathematics》 SCIE 2013年第9期1743-1750,共8页
For each integer g≥2, we construct a family of hyperelliptic curves of genus g whose slope reaches the upper bound obtained by Xiao.
关键词 hyperelliptic curve modular invariant moduli space of curves semistable reduction SLOPE
原文传递
The Main Conjecture on Geometric MDS Codes From Hyperelliptic Curves
10
作者 唐立中 《Chinese Science Bulletin》 SCIE EI CAS 1994年第12期974-979,共6页
In Ref.[2] the author dealt with the Main conjecture on geometric codes andproved the correctness of the conjecture for codes arising from curves with genus 1 or2 when the cardinal of the ground field is large enough.... In Ref.[2] the author dealt with the Main conjecture on geometric codes andproved the correctness of the conjecture for codes arising from curves with genus 1 or2 when the cardinal of the ground field is large enough. In this note, the conjecturefor codes from hyperelliptic curves is attacked. 展开更多
关键词 algebraic-geometric CODES hyperelliptic curves MDS CODES JACOBIAN ZETA function.
原文传递
Counting Isomorphism Classes of Pointed Hyperelliptic Curves of Genus 4 over Finite Fields with Even Characteristic
11
作者 Huah CHU Ying Pu DENG Tse-Chung YANG 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2010年第6期1019-1054,共36页
This paper is devoted to counting the number of isomorphism classes of pointed hyperelliptic curves over finite fields. We deal with the genus 4 case and the finite fields are of even characteristics. The number of is... This paper is devoted to counting the number of isomorphism classes of pointed hyperelliptic curves over finite fields. We deal with the genus 4 case and the finite fields are of even characteristics. The number of isomorphism classes is computed and the explicit formulae are given. This number can be represented as a polynomial in q of degree 7, where q is the order of the finite field. The result can be used in the classification problems and it is useful for further studies of hyperelliptic curve cryptosystems, e.g. it is of interest for research on implementing the arithmetics of curves of low genus for cryptographic purposes. It could also be of interest for point counting problems; both on moduli spaces of curves, and on finding the maximal number of points that a pointed hyperelliptic curve over a given finite field may have. 展开更多
关键词 hypereUiptic curves hyperelliptic curve cryptosystems JACOBIANS isomorphism classes STABILIZER
原文传递
Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications 被引量:1
12
作者 Usman Ali Mohd Yamani Idna Idris +6 位作者 Jaroslav Frnda Mohamad Nizam Bin Ayub Roobaea Alroobaea Fahad Almansour Nura Modi Shagari Insaf Ullah Ihsan Ali 《Computers, Materials & Continua》 SCIE EI 2022年第5期2515-2532,共18页
Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unn... Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-relatedprocesses to attain more profits. However, such IoT based smart industriesneed internet connectivity and interoperability which makes them susceptibleto numerous cyber-attacks due to the scarcity of computational resourcesof IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoTenvironment. In this paper, we propose a hyperelliptic curve cryptography(HECC) based IIoT Certificateless Signcryption (IIoT-CS) scheme, with theaim of improving security while lowering computational and communicationoverhead in IIoT environment. HECC with 80-bit smaller key and parameterssizes offers similar security as elliptic curve cryptography (ECC) with 160-bitlong key and parameters sizes. We assessed the IIoT-CS scheme security byapplying formal and informal security evaluation techniques. We used Realor Random (RoR) model and the widely used automated validation of internet security protocols and applications (AVISPA) simulation tool for formalsecurity analysis and proved that the IIoT-CS scheme provides resistance tovarious attacks. Our proposed IIoT-CS scheme is relatively less expensivecompared to the current state-of-the-art in terms of computational cost andcommunication overhead. Furthermore, the IIoT-CS scheme is 31.25% and 51.31% more efficient in computational cost and communication overhead,respectively, compared to the most recent protocol. 展开更多
关键词 IoT security authentication protocols hyperelliptic curve cryptography certificateless public key cryptography
下载PDF
Novel Hyper-Combined Public Key Based Cloud Storage Key Management Scheme
13
作者 SONG Ningning CHEN Yucyun 《China Communications》 SCIE CSCD 2014年第A02期185-194,共10页
In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme... In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system 展开更多
关键词 cloud storage hyperelliptic curve combined public key key management hiddenmapping
下载PDF
An Efficient Proxy Blind Signcryption Scheme for IoT
14
作者 Aamer Khan Insaf Ullah +3 位作者 Fahad Algarni Muhammad Naeem M.Irfan Uddin Muhammad Asghar Khan 《Computers, Materials & Continua》 SCIE EI 2022年第3期4293-4306,共14页
Recent years have witnessed growing scientific research interest in the Internet of Things(IoT)technologies,which supports the development of a variety of applications such as health care,Industry 4.0,agriculture,ecol... Recent years have witnessed growing scientific research interest in the Internet of Things(IoT)technologies,which supports the development of a variety of applications such as health care,Industry 4.0,agriculture,ecological data management,and other various domains.IoT utilizes the Internet as a prime medium of communication for both single documents as well as multi-digital messages.However,due to the wide-open nature of the Internet,it is important to ensure the anonymity,untraceably,confidentiality,and unforgeability of communication with efficient computational complexity and low bandwidth.We designed a light weight and secure proxy blind signcryption for multi-digital messages based on a hyperelliptic curve(HEC).Our results outperform the available schemes in terms of computational cost and communication bandwidth.The designed scheme also has the desired authentication,unforgeability of warrants and/or plaintext,confidentiality,integrity,and blindness,respectively.Further,our scheme is more suitable for devices with low computation power such as mobiles and tablets. 展开更多
关键词 Proxy signcryption multi-digital-documents proxy blind signcryption hyperelliptic curve IOT
下载PDF
HAMILTONIANS WITH TWO DEGREES OF FREEDOM ADMITTING A SINGLEVALUED GENERAL SOLUTION
15
作者 R.Conte M.Musette C.Verhoeven 《Analysis in Theory and Applications》 2005年第2期188-200,共13页
Following the basic principles stated by Painlevé, we first revisit the process of selecting the admissible time-independent Hamiltonians H = (p1^2 + p2^2)/2 + V(q1, q2) whose some integer power qj^nj (t)... Following the basic principles stated by Painlevé, we first revisit the process of selecting the admissible time-independent Hamiltonians H = (p1^2 + p2^2)/2 + V(q1, q2) whose some integer power qj^nj (t) of the general solution is a singlevalued function of the complez time t. In addition to the well known rational potentials V of Hénon-Heiles, this selects possible cases with a trigonometric dependence of V on qj. Then, by establishing the relevant confluences, we restrict the question of the explicit integration of the seven (three “cubic” plus four “quartic”) rational Hénon-Heiles cases to the quartic cases. Finally, we perform the explicit integration of the quartic cases, thus proving that the seven rational cases have a meromorphic general solution explicitly given by a genus two hyperelliptic function. 展开更多
关键词 two degree of freedom Hamiltonians Painlevé test Painlevé property Hdnon-Heiles Hamiltonian hyperelliptic
下载PDF
One-way permutation on a family of surfaces
16
作者 祝跃飞 裴定一 《Chinese Science Bulletin》 SCIE EI CAS 1995年第23期1954-1956,共3页
In the’recent decade, one-way functions have very. important applications in cryptograpy, especially in public key systems and generators of pseudorandom number. In fact, modem cryptograph is developed based on the a... In the’recent decade, one-way functions have very. important applications in cryptograpy, especially in public key systems and generators of pseudorandom number. In fact, modem cryptograph is developed based on the assumption of the existence of oneway function. A one-way function which is also a permutation is called a one-way permutation. 展开更多
关键词 DISCRETE LOGARITHM hyperelliptic CURVE one-way permutation.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部