Method to generate elliptic curves based on CM algorithm

The cryptosystem of elliptic curve had been put forward by Miller and Koblitz solely in 1985. The cryptosystem of elliptic curve owns three special advantages in terms of recent research: 1. It has larger flexibility when it chooses groups; 2. There wouldn't be any effective sub-index arithmeti...

Full description

Saved in:
Bibliographic Details
Published in2010 IEEE International Conference on Information Theory and Information Security pp. 164 - 166
Main Author Bin Yu
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2010
Subjects
Online AccessGet full text
ISBN1424469422
9781424469420
DOI10.1109/ICITIS.2010.5688754

Cover

Abstract The cryptosystem of elliptic curve had been put forward by Miller and Koblitz solely in 1985. The cryptosystem of elliptic curve owns three special advantages in terms of recent research: 1. It has larger flexibility when it chooses groups; 2. There wouldn't be any effective sub-index arithmetic to attack it if the cryptosystem of elliptic curve is suitably chosen; 3. It has a short key. In this paper, an efficient method to generate the elliptic curves which bases on the CM algorithm is presented .It may generate many elliptic curves which are suitable for building the cryptosystem. With the characteristic of high security and easy implementation, this kind of elliptic curves provides foundation for the construction of the cryptosystem over the elliptic curves, which can resist all kinds of attacks on itself. Meanwhile, in this paper the steps of the new algorithm are presented and its correctness and feasibility are proved and analyzed in theory. The advantages that the cryptosystem of elliptic curve owns are quite suitable for the encryption of the web communication, and it has become the research hotspot of web communication security field.
AbstractList The cryptosystem of elliptic curve had been put forward by Miller and Koblitz solely in 1985. The cryptosystem of elliptic curve owns three special advantages in terms of recent research: 1. It has larger flexibility when it chooses groups; 2. There wouldn't be any effective sub-index arithmetic to attack it if the cryptosystem of elliptic curve is suitably chosen; 3. It has a short key. In this paper, an efficient method to generate the elliptic curves which bases on the CM algorithm is presented .It may generate many elliptic curves which are suitable for building the cryptosystem. With the characteristic of high security and easy implementation, this kind of elliptic curves provides foundation for the construction of the cryptosystem over the elliptic curves, which can resist all kinds of attacks on itself. Meanwhile, in this paper the steps of the new algorithm are presented and its correctness and feasibility are proved and analyzed in theory. The advantages that the cryptosystem of elliptic curve owns are quite suitable for the encryption of the web communication, and it has become the research hotspot of web communication security field.
Author Bin Yu
Author_xml – sequence: 1
  surname: Bin Yu
  fullname: Bin Yu
  email: eyb@sina.com
  organization: Dept. of Document Examination, China Criminal Police Univ., Shenyang, China
BookMark eNo1j81OwzAQhI0ACVryBL34BVK89jp2jijiJ1IrDuReOfamNUqTKjFIvD2VKHMZzXcYzSzYzTAOxNgKxBpAlI91VTf1x1qKM9CFtUbjFctKYwElYlGiMtds8R-kvGPZPH-Ks7Q0Sul7ZreUDmPgaeR7GmhyiTj1fTyl6Ln_mr5p5q2bKfBx4NWWu34_TjEdjg_stnP9TNnFl6x5eW6qt3zz_lpXT5s8liLl6EBZTa02ou3AYgkE6IQ-T0VhUArpg8fCgkfAIoDAzodCgQ9B6xZILdnqrzYS0e40xaObfnaXr-oXxm9IVg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICITIS.2010.5688754
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781424469437
1424469430
1424469414
9781424469413
EndPage 166
ExternalDocumentID 5688754
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-4a1385eb570bf18491e14a058874074202cdc4681c4146d104fcd631cdd55b1e3
IEDL.DBID RIE
ISBN 1424469422
9781424469420
IngestDate Wed Aug 27 03:05:09 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-4a1385eb570bf18491e14a058874074202cdc4681c4146d104fcd631cdd55b1e3
PageCount 3
ParticipantIDs ieee_primary_5688754
PublicationCentury 2000
PublicationDate 2010-Dec.
PublicationDateYYYYMMDD 2010-12-01
PublicationDate_xml – month: 12
  year: 2010
  text: 2010-Dec.
PublicationDecade 2010
PublicationTitle 2010 IEEE International Conference on Information Theory and Information Security
PublicationTitleAbbrev ICITIS
PublicationYear 2010
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000527335
Score 1.4515976
Snippet The cryptosystem of elliptic curve had been put forward by Miller and Koblitz solely in 1985. The cryptosystem of elliptic curve owns three special advantages...
SourceID ieee
SourceType Publisher
StartPage 164
SubjectTerms Algorithm design and analysis
CM algorithm
cryptosystemy
elliptic curve
Elliptic curve cryptography
Elliptic curves
Equations
Mathematical model
Title Method to generate elliptic curves based on CM algorithm
URI https://ieeexplore.ieee.org/document/5688754
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLXaTkyAWsRbHhhJa8ePOHNF1SIFIVGkbpVfKRWQoJAw8PXYSRoEYmCzPVh-yPf42vecC8CVlJIIo3SQKpIG1GGgt4MkiEiKhY4EjrhnIyd3fP5Ib1ds1QPXHRfGWlsHn9mxL9Z_-SbXlX8qmzDujgSjfdCPBG-4Wt17CvJKYoTtuFs8pmG4k3Rq66hVHcIoniymi-XioQntarv9kV-lhpfZPkh2A2uiSp7HVanG-vOXZuN_R34ARt9EPnjfQdQh6NlsCERSZ42GZQ43teh0aaGX5XTGQ0NdFR_2HXpwMzDP4DSB8mWTF9vy6XUElrOb5XQetAkUgm2MyoBKTASzikVIuZWnMbaYSsSET8PnXGIUaqMpF1hTZy-Nc8xSbTjB2hjGFLbkCAyyPLPHAOqUK-pcFXeZSalyZ5Yw5EyTkl5BjUT2BAz9pNdvjUTGup3v6d_NZ2Av7KJCzsGgLCp74bC9VJf1pn4BTBqdcw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLVKGWAC1CLeeGAkrR3becwVVQNNhUSQulV-pVRAgkrCwNdjJ2kQiIHN9mD5Id_ja99zLgBXnHMSKCGdVJDUoQYDrR0kjk9SHEg_wL5n2cjxzJs80ts5m3fAdcuF0VpXwWd6YIvVX77KZWmfyobMM0eC0S2wzSilrGZrtS8qyGqJEbZhb3khdd2NqFNTR43uEEbhMBpFSfRQB3c1Hf_IsFIBzHgPxJuh1XElz4OyEAP5-Uu18b9j3wf9byofvG9B6gB0dNYDQVzljYZFDpeV7HShoRXmNOZDQlmuP_Q7tPCmYJ7BUQz5yzJfr4qn1z5IxjfJaOI0KRScVYgKh3JMAqYF85Ewa09DrDHliAU2EZ9xipErlaRegCU1FlMZ1yyVyiNYKsWYwJocgm6WZ_oIQJl6ghpnxVxnUirMqSUMGeMkuNVQI74-Bj076cVbLZKxaOZ78nfzJdiZJPF0MY1md6dg121jRM5At1iX-twgfSEuqg3-AsVqoMA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+IEEE+International+Conference+on+Information+Theory+and+Information+Security&rft.atitle=Method+to+generate+elliptic+curves+based+on+CM+algorithm&rft.au=Bin+Yu&rft.date=2010-12-01&rft.pub=IEEE&rft.isbn=9781424469420&rft.spage=164&rft.epage=166&rft_id=info:doi/10.1109%2FICITIS.2010.5688754&rft.externalDocID=5688754
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424469420/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424469420/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424469420/sc.gif&client=summon&freeimage=true