Design and Analysis of Pairing-Friendly Elliptic Curves for Cryptographic Primitives

07/13/2023
by   Mahender Kumar, et al.
0

Elliptic curve cryptography (ECC) is a remarkable mathematical tool that offers the same level of security as traditional public-key cryptography (PKC) with a significantly smaller key size and lower computational requirements. The use of pairing on elliptic curves has emerged as a vibrant field of research that provides enhanced security measures for the next generation of cryptographic systems. This thesis explores using ECC and Pairing-Based Cryptosystems (PBC) as effective mathematical tools for achieving high-security levels with minimal key size and computation cost. Specifically, the research aims to analyze Pairing-Friendly Elliptic Curves (PF-EC) and their practicality in resource-constrained environments. It proposes solutions to some of the limitations of existing applications of pairing-based cryptography. The thesis begins by presenting a comprehensive framework for constructing PF-EC and evaluating the practical security of several families of pairing-friendly curves. The study then explores the limitations of Identity-Based Encryption (IBE), a recognized application of pairing-based cryptography. It proposes mechanisms to address issues such as key escrow, secure key issuing, user slandering, and key abusing problems. The proposed solutions include an Escrow-Free Identity-Based Encryption (EF-IBE) scheme secured against confidentiality and an Escrow-Free Identity-Based Signature (EF-IBS) scheme that is forgeable and secure.

READ FULL TEXT
research
08/09/2018

A Secure Multiple Elliptic Curves Digital Signature Algorithm for Blockchain

Most cryptocurrency systems or systems based on blockchain technology ar...
research
12/04/2022

Pairing-Friendly Elliptic Curves: Revisited Taxonomy, Attacks and Security Concern

Major families of pairing-friendly elliptic curves, including BN, BLS12,...
research
06/03/2020

An Authenticated Key Scheme over Elliptic Curves and Security Considerations

Nodes of sensor networks may be resource-constrained devices, often havi...
research
11/09/2012

Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)

In this paper secured wireless communication using fuzzy logic based hig...
research
03/31/2023

Light Weight Cryptographic Address Generation Using System State Entropy Gathering for IPv6 Based MANETs

In IPv6 based MANETs, the neighbor discovery enables nodes to self-confi...
research
06/03/2020

An Authenticated Key Scheme over Elliptic Curves for Topological Networks

Nodes of sensor networks may be resource-constrained devices, often havi...
research
02/27/2019

Efficient and Secure ECDSA Algorithm and its Applications: A Survey

Public-key cryptography algorithms, especially elliptic curve cryptograp...

Please sign up or login with your details

Forgot password? Click here to reset