Unknown

Dataset Information

0

Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.


ABSTRACT: Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user's public key based on the user's identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al.

SUBMITTER: Wang M 

PROVIDER: S-EPMC5001717 | biostudies-literature | 2016

REPOSITORIES: biostudies-literature

altmetric image

Publications

Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.

Wang Maocai M   Dai Guangming G   Choo Kim-Kwang Raymond KK   Jayaraman Prem Prakash PP   Ranjan Rajiv R  

PloS one 20160826 8


Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user's public key based on the user's identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the effi  ...[more]

Similar Datasets

| S-EPMC6380619 | biostudies-literature
| S-EPMC5872142 | biostudies-literature
| S-EPMC5480091 | biostudies-other
| S-EPMC6002289 | biostudies-literature
| S-EPMC6639405 | biostudies-literature
| S-EPMC5338017 | biostudies-literature
| S-EPMC7024709 | biostudies-literature
| S-EPMC4514837 | biostudies-literature