Method to generate elliptic curves based on CM algorithm
The cryptosystem of elliptic curve had been put forward by Miller and Koblitz solely in 1985. The cryptosystem of elliptic curve owns three special advantages in terms of recent research: 1. It has larger flexibility when it chooses groups; 2. There wouldn't be any effective sub-index arithmeti...
Saved in:
| Published in | 2010 IEEE International Conference on Information Theory and Information Security pp. 164 - 166 |
|---|---|
| Main Author | |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.12.2010
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 1424469422 9781424469420 |
| DOI | 10.1109/ICITIS.2010.5688754 |
Cover
| Abstract | The cryptosystem of elliptic curve had been put forward by Miller and Koblitz solely in 1985. The cryptosystem of elliptic curve owns three special advantages in terms of recent research: 1. It has larger flexibility when it chooses groups; 2. There wouldn't be any effective sub-index arithmetic to attack it if the cryptosystem of elliptic curve is suitably chosen; 3. It has a short key. In this paper, an efficient method to generate the elliptic curves which bases on the CM algorithm is presented .It may generate many elliptic curves which are suitable for building the cryptosystem. With the characteristic of high security and easy implementation, this kind of elliptic curves provides foundation for the construction of the cryptosystem over the elliptic curves, which can resist all kinds of attacks on itself. Meanwhile, in this paper the steps of the new algorithm are presented and its correctness and feasibility are proved and analyzed in theory. The advantages that the cryptosystem of elliptic curve owns are quite suitable for the encryption of the web communication, and it has become the research hotspot of web communication security field. |
|---|---|
| AbstractList | The cryptosystem of elliptic curve had been put forward by Miller and Koblitz solely in 1985. The cryptosystem of elliptic curve owns three special advantages in terms of recent research: 1. It has larger flexibility when it chooses groups; 2. There wouldn't be any effective sub-index arithmetic to attack it if the cryptosystem of elliptic curve is suitably chosen; 3. It has a short key. In this paper, an efficient method to generate the elliptic curves which bases on the CM algorithm is presented .It may generate many elliptic curves which are suitable for building the cryptosystem. With the characteristic of high security and easy implementation, this kind of elliptic curves provides foundation for the construction of the cryptosystem over the elliptic curves, which can resist all kinds of attacks on itself. Meanwhile, in this paper the steps of the new algorithm are presented and its correctness and feasibility are proved and analyzed in theory. The advantages that the cryptosystem of elliptic curve owns are quite suitable for the encryption of the web communication, and it has become the research hotspot of web communication security field. |
| Author | Bin Yu |
| Author_xml | – sequence: 1 surname: Bin Yu fullname: Bin Yu email: eyb@sina.com organization: Dept. of Document Examination, China Criminal Police Univ., Shenyang, China |
| BookMark | eNo1j81OwzAQhI0ACVryBL34BVK89jp2jijiJ1IrDuReOfamNUqTKjFIvD2VKHMZzXcYzSzYzTAOxNgKxBpAlI91VTf1x1qKM9CFtUbjFctKYwElYlGiMtds8R-kvGPZPH-Ks7Q0Sul7ZreUDmPgaeR7GmhyiTj1fTyl6Ln_mr5p5q2bKfBx4NWWu34_TjEdjg_stnP9TNnFl6x5eW6qt3zz_lpXT5s8liLl6EBZTa02ou3AYgkE6IQ-T0VhUArpg8fCgkfAIoDAzodCgQ9B6xZILdnqrzYS0e40xaObfnaXr-oXxm9IVg |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICITIS.2010.5688754 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9781424469437 1424469430 1424469414 9781424469413 |
| EndPage | 166 |
| ExternalDocumentID | 5688754 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
| ID | FETCH-LOGICAL-i90t-4a1385eb570bf18491e14a058874074202cdc4681c4146d104fcd631cdd55b1e3 |
| IEDL.DBID | RIE |
| ISBN | 1424469422 9781424469420 |
| IngestDate | Wed Aug 27 03:05:09 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-4a1385eb570bf18491e14a058874074202cdc4681c4146d104fcd631cdd55b1e3 |
| PageCount | 3 |
| ParticipantIDs | ieee_primary_5688754 |
| PublicationCentury | 2000 |
| PublicationDate | 2010-Dec. |
| PublicationDateYYYYMMDD | 2010-12-01 |
| PublicationDate_xml | – month: 12 year: 2010 text: 2010-Dec. |
| PublicationDecade | 2010 |
| PublicationTitle | 2010 IEEE International Conference on Information Theory and Information Security |
| PublicationTitleAbbrev | ICITIS |
| PublicationYear | 2010 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000527335 |
| Score | 1.4515976 |
| Snippet | The cryptosystem of elliptic curve had been put forward by Miller and Koblitz solely in 1985. The cryptosystem of elliptic curve owns three special advantages... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 164 |
| SubjectTerms | Algorithm design and analysis CM algorithm cryptosystemy elliptic curve Elliptic curve cryptography Elliptic curves Equations Mathematical model |
| Title | Method to generate elliptic curves based on CM algorithm |
| URI | https://ieeexplore.ieee.org/document/5688754 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLXaTkyAWsRbHhhJa8ePOHNF1SIFIVGkbpVfKRWQoJAw8PXYSRoEYmCzPVh-yPf42vecC8CVlJIIo3SQKpIG1GGgt4MkiEiKhY4EjrhnIyd3fP5Ib1ds1QPXHRfGWlsHn9mxL9Z_-SbXlX8qmzDujgSjfdCPBG-4Wt17CvJKYoTtuFs8pmG4k3Rq66hVHcIoniymi-XioQntarv9kV-lhpfZPkh2A2uiSp7HVanG-vOXZuN_R34ARt9EPnjfQdQh6NlsCERSZ42GZQ43teh0aaGX5XTGQ0NdFR_2HXpwMzDP4DSB8mWTF9vy6XUElrOb5XQetAkUgm2MyoBKTASzikVIuZWnMbaYSsSET8PnXGIUaqMpF1hTZy-Nc8xSbTjB2hjGFLbkCAyyPLPHAOqUK-pcFXeZSalyZ5Yw5EyTkl5BjUT2BAz9pNdvjUTGup3v6d_NZ2Av7KJCzsGgLCp74bC9VJf1pn4BTBqdcw |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLVKGWAC1CLeeGAkrR3becwVVQNNhUSQulV-pVRAgkrCwNdjJ2kQiIHN9mD5Id_ja99zLgBXnHMSKCGdVJDUoQYDrR0kjk9SHEg_wL5n2cjxzJs80ts5m3fAdcuF0VpXwWd6YIvVX77KZWmfyobMM0eC0S2wzSilrGZrtS8qyGqJEbZhb3khdd2NqFNTR43uEEbhMBpFSfRQB3c1Hf_IsFIBzHgPxJuh1XElz4OyEAP5-Uu18b9j3wf9byofvG9B6gB0dNYDQVzljYZFDpeV7HShoRXmNOZDQlmuP_Q7tPCmYJ7BUQz5yzJfr4qn1z5IxjfJaOI0KRScVYgKh3JMAqYF85Ewa09DrDHliAU2EZ9xipErlaRegCU1FlMZ1yyVyiNYKsWYwJocgm6WZ_oIQJl6ghpnxVxnUirMqSUMGeMkuNVQI74-Bj076cVbLZKxaOZ78nfzJdiZJPF0MY1md6dg121jRM5At1iX-twgfSEuqg3-AsVqoMA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+IEEE+International+Conference+on+Information+Theory+and+Information+Security&rft.atitle=Method+to+generate+elliptic+curves+based+on+CM+algorithm&rft.au=Bin+Yu&rft.date=2010-12-01&rft.pub=IEEE&rft.isbn=9781424469420&rft.spage=164&rft.epage=166&rft_id=info:doi/10.1109%2FICITIS.2010.5688754&rft.externalDocID=5688754 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424469420/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424469420/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424469420/sc.gif&client=summon&freeimage=true |