期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Rational Points on Genus 3 Real Hyperelliptic Curves
1
作者 Brice M. Miayoka Regis F. Babindamana Basile G. R. Bossoto 《Open Journal of Discrete Mathematics》 2021年第4期103-113,共11页
We compute rational points on real hyperelliptic curves of genus 3 defined on <img src="Edit_ff1a2758-8302-45a6-8c7e-a73bd35f12bd.png" width="20" height="18" alt="" /> who... We compute rational points on real hyperelliptic curves of genus 3 defined on <img src="Edit_ff1a2758-8302-45a6-8c7e-a73bd35f12bd.png" width="20" height="18" alt="" /> whose Jacobian have Mordell-Weil rank <em>r=0</em>. We present an implementation in sagemath of an algorithm which describes the birational transformation of real hyperelliptic curves into imaginary hyperelliptic curves and <span>the Chabauty-Coleman method to find <em>C </em>(<img src="Edit_243e29b4-1b26-469a-9e65-461ffac1e473.png" width="20" height="18" alt="" />)<span></span>. We run the algorithms in</span> Sage on 47 real hyperelliptic curves of genus 3. 展开更多
关键词 hyperelliptic Curve JACOBIAN Coleman Integration Rational Point
下载PDF
Verifiable delay functions and delay encryptions from hyperelliptic curves
2
作者 Chao Chen Fangguo Zhang 《Cybersecurity》 EI CSCD 2024年第4期110-121,共12页
Verifiable delay functions(VDFs)and delay encryptions(DEs)are two important primitives in decentralized systems,while existing constructions are mainly based on time-lock puzzles.A disparate framework has been establi... Verifiable delay functions(VDFs)and delay encryptions(DEs)are two important primitives in decentralized systems,while existing constructions are mainly based on time-lock puzzles.A disparate framework has been established by applying isogenies and pairings on elliptic curves.Following this line,we first employ Richelot isogenies and non-degenerate pairings from hyperelliptic curves for a new verifiable delay function,such that no auxiliary proof and interaction are needed for the verification.Then,we demonstrate that our scheme satisfies all security requirements,in particular,our VDF can resist several attacks,including the latest attacks for SIDH.Besides,resorting to the same techniques,a secure delay encryption from hyperelliptic curves is constructed by modifying Boneh and Frankiln's IBE scheme,which shares the identical setup with our VDF scheme.As far as we know,these schemes are the first cryptographic applications from high-genus isogenies apart from basic protocols,i.e.,hash functions and key exchange protocols. 展开更多
关键词 Verifiable delay functions Delay encryptions hyperelliptic curves Richelot isogenies PAIRINGS
原文传递
Families of hyperelliptic curves with maximal slopes 被引量:2
3
作者 LIU XiaoLei TAN ShengLi 《Science China Mathematics》 SCIE 2013年第9期1743-1750,共8页
For each integer g≥2, we construct a family of hyperelliptic curves of genus g whose slope reaches the upper bound obtained by Xiao.
关键词 hyperelliptic curve modular invariant moduli space of curves semistable reduction SLOPE
原文传递
Counting Isomorphism Classes of Pointed Hyperelliptic Curves of Genus 4 over Finite Fields with Even Characteristic
4
作者 Huah CHU Ying Pu DENG Tse-Chung YANG 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2010年第6期1019-1054,共36页
This paper is devoted to counting the number of isomorphism classes of pointed hyperelliptic curves over finite fields. We deal with the genus 4 case and the finite fields are of even characteristics. The number of is... This paper is devoted to counting the number of isomorphism classes of pointed hyperelliptic curves over finite fields. We deal with the genus 4 case and the finite fields are of even characteristics. The number of isomorphism classes is computed and the explicit formulae are given. This number can be represented as a polynomial in q of degree 7, where q is the order of the finite field. The result can be used in the classification problems and it is useful for further studies of hyperelliptic curve cryptosystems, e.g. it is of interest for research on implementing the arithmetics of curves of low genus for cryptographic purposes. It could also be of interest for point counting problems; both on moduli spaces of curves, and on finding the maximal number of points that a pointed hyperelliptic curve over a given finite field may have. 展开更多
关键词 hypereUiptic curves hyperelliptic curve cryptosystems JACOBIANS isomorphism classes STABILIZER
原文传递
Securing the Internet of Health Things with Certificateless Anonymous Authentication Scheme
5
作者 Nisreen Innab 《Computers, Materials & Continua》 SCIE EI 2024年第8期2237-2258,共22页
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t... Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes. 展开更多
关键词 Internet of things internet of health things security authentication hyperelliptic curve cryptography
下载PDF
Fault Attacks on Hyperelliptic Curve Discrete Logarithm Problem over Finite Fields 被引量:2
6
作者 Wang Mingqiang Xue Haiyang Zhan Tao 《China Communications》 SCIE CSCD 2012年第11期150-161,共12页
In this paper, we present two explicit invalid-curve attacks on the genus 2 hyperelliptic curve over a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, ... In this paper, we present two explicit invalid-curve attacks on the genus 2 hyperelliptic curve over a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, we discuss the construction of an invalid curve based on the faulted divisor. Our attacks are based on the fact that the Hyperelliptic Curve Scalar Multiplication (HECSM) algorithm does not utilize the curve parameters and We consider three hyperelliptic curves as the attack targets. For curve with security level 186 (in bits), our attack method can get the weakest invalid curve with security level 42 (in bits); there are 93 invalid curves with security level less than 50. We also estimate the theoretical probability of getting a weak hyperelliptic curve whose cardinality is a smooth integer. Finally, we show that the complexity of the fault attack is subexponential if the attacker can freely inject a fault in the input divisor. Cryptosystems based on the genus 2 hyperelliptic curves cannot work against our attack algorithm in practice. 展开更多
关键词 hyperelliptic curve discrete logarithm finite field GENUS CRYPTOSYSTEM
下载PDF
Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications 被引量:1
7
作者 Usman Ali Mohd Yamani Idna Idris +6 位作者 Jaroslav Frnda Mohamad Nizam Bin Ayub Roobaea Alroobaea Fahad Almansour Nura Modi Shagari Insaf Ullah Ihsan Ali 《Computers, Materials & Continua》 SCIE EI 2022年第5期2515-2532,共18页
Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unn... Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-relatedprocesses to attain more profits. However, such IoT based smart industriesneed internet connectivity and interoperability which makes them susceptibleto numerous cyber-attacks due to the scarcity of computational resourcesof IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoTenvironment. In this paper, we propose a hyperelliptic curve cryptography(HECC) based IIoT Certificateless Signcryption (IIoT-CS) scheme, with theaim of improving security while lowering computational and communicationoverhead in IIoT environment. HECC with 80-bit smaller key and parameterssizes offers similar security as elliptic curve cryptography (ECC) with 160-bitlong key and parameters sizes. We assessed the IIoT-CS scheme security byapplying formal and informal security evaluation techniques. We used Realor Random (RoR) model and the widely used automated validation of internet security protocols and applications (AVISPA) simulation tool for formalsecurity analysis and proved that the IIoT-CS scheme provides resistance tovarious attacks. Our proposed IIoT-CS scheme is relatively less expensivecompared to the current state-of-the-art in terms of computational cost andcommunication overhead. Furthermore, the IIoT-CS scheme is 31.25% and 51.31% more efficient in computational cost and communication overhead,respectively, compared to the most recent protocol. 展开更多
关键词 IoT security authentication protocols hyperelliptic curve cryptography certificateless public key cryptography
下载PDF
Novel Hyper-Combined Public Key Based Cloud Storage Key Management Scheme
8
作者 SONG Ningning CHEN Yucyun 《China Communications》 SCIE CSCD 2014年第A02期185-194,共10页
In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme... In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system 展开更多
关键词 cloud storage hyperelliptic curve combined public key key management hiddenmapping
下载PDF
An Efficient Proxy Blind Signcryption Scheme for IoT
9
作者 Aamer Khan Insaf Ullah +3 位作者 Fahad Algarni Muhammad Naeem M.Irfan Uddin Muhammad Asghar Khan 《Computers, Materials & Continua》 SCIE EI 2022年第3期4293-4306,共14页
Recent years have witnessed growing scientific research interest in the Internet of Things(IoT)technologies,which supports the development of a variety of applications such as health care,Industry 4.0,agriculture,ecol... Recent years have witnessed growing scientific research interest in the Internet of Things(IoT)technologies,which supports the development of a variety of applications such as health care,Industry 4.0,agriculture,ecological data management,and other various domains.IoT utilizes the Internet as a prime medium of communication for both single documents as well as multi-digital messages.However,due to the wide-open nature of the Internet,it is important to ensure the anonymity,untraceably,confidentiality,and unforgeability of communication with efficient computational complexity and low bandwidth.We designed a light weight and secure proxy blind signcryption for multi-digital messages based on a hyperelliptic curve(HEC).Our results outperform the available schemes in terms of computational cost and communication bandwidth.The designed scheme also has the desired authentication,unforgeability of warrants and/or plaintext,confidentiality,integrity,and blindness,respectively.Further,our scheme is more suitable for devices with low computation power such as mobiles and tablets. 展开更多
关键词 Proxy signcryption multi-digital-documents proxy blind signcryption hyperelliptic curve IOT
下载PDF
Effective generalized equations of secure hyperelliptic curve digital signature algorithms 被引量:7
10
作者 YOU Lin ,SANG Yong-xuan College of Communication Engineering,Hangzhou Dianzi University,Hangzhou 310018,China 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2010年第2期100-108,115,共10页
A hyperelliptic curve digital signature algorithm (HECDSA) can be viewed as the hyperelliptic curve analogue of the standard digital signature algorithm (DSA). This article discusses divisor evaluations, the basic... A hyperelliptic curve digital signature algorithm (HECDSA) can be viewed as the hyperelliptic curve analogue of the standard digital signature algorithm (DSA). This article discusses divisor evaluations, the basic HECDSA, variants, two HECDSA equations and a 4-tuple HECDSA scheme, and puts forward a generalized equation for HECDSA. From this generalized equation, seven general HECDSA types are derived based on the efficiency requirements. Meanwhile, the securities of these general HECDSA types are analyzed in detail. 展开更多
关键词 hyperelliptic curve digital signature algorithm generalized equation hyperelliptic curve discrete logarithm problem
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部