NO20044028L - Bruk av isogenier for utvikling av kryptosystemer - Google Patents

Bruk av isogenier for utvikling av kryptosystemer

Info

Publication number
NO20044028L
NO20044028L NO20044028A NO20044028A NO20044028L NO 20044028 L NO20044028 L NO 20044028L NO 20044028 A NO20044028 A NO 20044028A NO 20044028 A NO20044028 A NO 20044028A NO 20044028 L NO20044028 L NO 20044028L
Authority
NO
Norway
Prior art keywords
isogenies
isogeny
techniques
key
encryption
Prior art date
Application number
NO20044028A
Other languages
English (en)
Norwegian (no)
Inventor
Davis Y Jao
Ramarathnam Venkatesan
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of NO20044028L publication Critical patent/NO20044028L/no

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/724Finite field arithmetic
    • G06F7/725Finite field arithmetic over elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3257Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using blind signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Computational Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Algebra (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Dental Preparations (AREA)
  • Glass Compositions (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Devices For Checking Fares Or Tickets At Control Points (AREA)
  • Developing Agents For Electrophotography (AREA)
  • Reverberation, Karaoke And Other Acoustics (AREA)
  • Transition And Organic Metals Composition Catalysts For Addition Polymerization (AREA)
  • Complex Calculations (AREA)
NO20044028A 2003-11-03 2004-09-24 Bruk av isogenier for utvikling av kryptosystemer NO20044028L (no)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US51714203P 2003-11-03 2003-11-03
US10/816,083 US7499544B2 (en) 2003-11-03 2004-03-31 Use of isogenies for design of cryptosystems

Publications (1)

Publication Number Publication Date
NO20044028L true NO20044028L (no) 2005-05-04

Family

ID=34426337

Family Applications (1)

Application Number Title Priority Date Filing Date
NO20044028A NO20044028L (no) 2003-11-03 2004-09-24 Bruk av isogenier for utvikling av kryptosystemer

Country Status (19)

Country Link
US (1) US7499544B2 (pt)
EP (1) EP1528705B1 (pt)
JP (1) JP4809598B2 (pt)
KR (1) KR101098701B1 (pt)
CN (1) CN100583755C (pt)
AT (1) ATE429098T1 (pt)
AU (1) AU2004218638B2 (pt)
BR (1) BRPI0404122A (pt)
CA (1) CA2483486C (pt)
CO (1) CO5630049A1 (pt)
DE (1) DE602004020565D1 (pt)
IL (1) IL164071A0 (pt)
MX (1) MXPA04010155A (pt)
MY (1) MY165770A (pt)
NO (1) NO20044028L (pt)
NZ (1) NZ535698A (pt)
RU (1) RU2376651C2 (pt)
SG (1) SG111191A1 (pt)
TW (1) TWI360990B (pt)

Families Citing this family (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006050605A1 (en) * 2004-11-11 2006-05-18 Certicom Corp. New trapdoor one-way function on elliptic curves and their applications to shorter signatures and asymmetric encryption
US7594261B2 (en) * 2005-02-08 2009-09-22 Microsoft Corporation Cryptographic applications of the Cartier pairing
US7680268B2 (en) 2005-03-15 2010-03-16 Microsoft Corporation Elliptic curve point octupling using single instruction multiple data processing
US7702098B2 (en) 2005-03-15 2010-04-20 Microsoft Corporation Elliptic curve point octupling for weighted projective coordinates
US7617397B2 (en) * 2005-04-29 2009-11-10 Microsoft Corporation Systems and methods for generation and validation of isogeny-based signatures
JP4575251B2 (ja) * 2005-07-25 2010-11-04 株式会社東芝 デジタル署名生成装置、デジタル署名検証装置、デジタル署名生成方法、デジタル署名検証方法、デジタル署名生成プログラム及びデジタル署名検証プログラム
CN1980123B (zh) * 2005-11-30 2010-07-21 中国科学院研究生院 基于ibe的pki系统的实现方法及其密钥管理装置
US8180047B2 (en) * 2006-01-13 2012-05-15 Microsoft Corporation Trapdoor pairings
JPWO2008156107A1 (ja) 2007-06-18 2010-08-26 日本電気株式会社 電子データの暗号化及び暗号化データ復号化システム及びその方法
KR101490687B1 (ko) * 2007-08-20 2015-02-06 삼성전자주식회사 홈 네트워크에서 디바이스들이 비밀 정보를 공유하는 방법및 이를 위한 장치
CN101925942B (zh) * 2008-02-20 2013-11-27 三菱电机株式会社 验证装置
US8037327B2 (en) * 2008-03-31 2011-10-11 Agilent Technologies, Inc. System and method for improving dynamic response in a power supply
US8625777B2 (en) * 2008-08-29 2014-01-07 National University Corporation Okayama University Pairing computation device, pairing computation method, and pairing computation program
US8250367B2 (en) * 2008-09-30 2012-08-21 Microsoft Corporation Cryptographic applications of efficiently evaluating large degree isogenies
US20100100947A1 (en) * 2008-10-21 2010-04-22 Apple Inc. Scheme for authenticating without password exchange
JP5268066B2 (ja) * 2009-01-16 2013-08-21 日本電信電話株式会社 変換演算装置、その方法、プログラム及び記録媒体
US8510558B2 (en) * 2009-02-17 2013-08-13 Alcatel Lucent Identity based authenticated key agreement protocol
CN101800640B (zh) * 2009-11-10 2012-09-05 浙江工业大学 基于Web Service的IBE密钥管理系统
US8634563B2 (en) 2010-12-17 2014-01-21 Microsoft Corporation Attribute based encryption using lattices
JP5693206B2 (ja) * 2010-12-22 2015-04-01 三菱電機株式会社 暗号処理システム、鍵生成装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム
RU2494553C2 (ru) * 2011-05-03 2013-09-27 ЗАО Институт инфокоммуникационных технологий Способ защиты информации
RU2450457C1 (ru) * 2011-05-20 2012-05-10 Государственное образовательное учреждение высшего профессионального образования Марийский государственный технический университет Способ шифрования
US9503259B2 (en) * 2012-02-09 2016-11-22 Irdeto B.V. System and method for generating and protecting cryptographic keys
US10148285B1 (en) 2012-07-25 2018-12-04 Erich Schmitt Abstraction and de-abstraction of a digital data stream
CN104348614B (zh) * 2013-07-24 2019-02-01 腾讯科技(深圳)有限公司 身份合法性验证的方法、装置及服务器
RU2541938C1 (ru) * 2013-11-20 2015-02-20 федеральное государственное автономное образовательное учреждение высшего образования "Санкт-Петербургский государственный политехнический университет" (ФГАОУ ВО "СПбПУ") Способ шифрования с защитой от квантовых атак на основе циклов функций вебера
US10795858B1 (en) 2014-02-18 2020-10-06 Erich Schmitt Universal abstraction and de-abstraction of a digital data stream
US20240356727A1 (en) * 2015-06-28 2024-10-24 Peter Lablans Method and Apparatus for Activating a Remote Device
US12425189B1 (en) * 2015-12-20 2025-09-23 Peter Lablans Cryptographic computer machines with novel switching devices
US12143468B2 (en) * 2015-12-20 2024-11-12 Lcip Jv Cryptographic computer machines with novel switching devices
JP6614979B2 (ja) * 2016-01-15 2019-12-04 三菱電機株式会社 暗号装置、暗号方法及び暗号プログラム
WO2017145018A1 (en) 2016-02-23 2017-08-31 nChain Holdings Limited A method and system for the secure transfer of entities on a blockchain
CN109074579B (zh) 2016-02-23 2022-10-11 区块链控股有限公司 使用分布式散列表和区块链保护计算机软件的方法及系统
KR102799781B1 (ko) 2016-02-23 2025-04-23 엔체인 홀딩스 리미티드 안전한 정보 교환과 계층 구조적이고 결정론적인 암호키를 위한 공통 비밀 결정
BR112018016825A2 (pt) 2016-02-23 2018-12-26 Nchain Holdings Ltd métodos para transferir, criar e resgatar um primeiro token associado ou não a um ativo digital, criar um terceiro token, programa de computador e dispositivo
SG11201806704TA (en) 2016-02-23 2018-09-27 Nchain Holdings Ltd Blockchain-based exchange with tokenisation
WO2017145047A1 (en) 2016-02-23 2017-08-31 nChain Holdings Limited Blockchain-implemented method for control and distribution of digital content
JP6833861B2 (ja) 2016-02-23 2021-02-24 エヌチェーン ホールディングス リミテッドNchain Holdings Limited ブロックチェーンシステム内におけるフィードバックを統合したエージェントベースチューリング完全なトランザクション
GB2562623A (en) 2016-02-23 2018-11-21 Nchain Holdings Ltd Registry and automated management method for blockchain-enforced smart contracts
JP6995762B2 (ja) 2016-02-23 2022-01-17 エヌチェーン ホールディングス リミテッド ブロックチェーンからのデータのセキュアな抽出のための暗号方法及びシステム
SG11201805542TA (en) 2016-02-23 2018-09-27 Nchain Holdings Ltd Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
MX2018010054A (es) 2016-02-23 2019-01-21 Nchain Holdings Ltd Metodo y sistema de tokenizacion para la implementacion de cambios de moneda en una cadena de bloques.
AU2017222421B2 (en) 2016-02-23 2022-09-01 nChain Holdings Limited Personal device security using elliptic curve cryptography for secret sharing
CN109155035B (zh) 2016-02-23 2023-07-04 区块链控股有限公司 用于使用区块链在点对点分布式账簿上有效转移实体的方法及系统
JP7083754B2 (ja) 2016-02-23 2022-06-13 エヌチェーン ホールディングス リミテッド スマートコントラクトに基づく自動給与支払方法及びシステムをもたらす、ブロックチェーン上の給与支払に関連付けられた暗号通貨の効率的な転送のための方法及びシステム
CN116934328A (zh) 2016-02-23 2023-10-24 区块链控股有限公司 用于经由区块链控制资产有关的动作的系统及方法
CN105915520B (zh) * 2016-04-18 2019-02-12 深圳大学 基于公钥可搜索加密的文件存储、搜索方法及存储系统
JP2017212699A (ja) * 2016-05-27 2017-11-30 三菱電機株式会社 暗号化装置、復号装置及び暗号システム
CA2984390A1 (en) * 2016-11-07 2018-05-07 Infosec Global Inc. Elliptic curve isogeny-based cryptographic scheme
EP3367608A1 (en) * 2017-02-28 2018-08-29 Koninklijke Philips N.V. Elliptic curve isogeny based key agreement protocol
EP3379766B1 (en) * 2017-03-20 2019-06-26 Huawei Technologies Co., Ltd. A wireless communication device for communication in a wireless communication network
US11146397B2 (en) * 2017-10-31 2021-10-12 Micro Focus Llc Encoding abelian variety-based ciphertext with metadata
CN108536651B (zh) * 2018-04-19 2022-04-05 武汉轻工大学 生成可逆模m矩阵的方法和装置
WO2019208484A1 (ja) * 2018-04-25 2019-10-31 日本電信電話株式会社 秘密集約総和システム、秘密計算装置、秘密集約総和方法、およびプログラム
WO2020071187A1 (ja) * 2018-10-04 2020-04-09 日本電信電話株式会社 秘密シグモイド関数計算システム、秘密ロジスティック回帰計算システム、秘密シグモイド関数計算装置、秘密ロジスティック回帰計算装置、秘密シグモイド関数計算方法、秘密ロジスティック回帰計算方法、プログラム
KR102184189B1 (ko) * 2018-11-19 2020-11-27 주식회사 엔에스에이치씨 꼬인 에드워즈 곡선에 대한 4차 아이소제니 계산 방법
KR102184188B1 (ko) * 2018-11-19 2020-11-27 주식회사 엔에스에이치씨 꼬인 에드워즈 곡선에 대한 3차 아이소제니 계산 방법
US11764940B2 (en) 2019-01-10 2023-09-19 Duality Technologies, Inc. Secure search of secret data in a semi-trusted environment using homomorphic encryption
US11032074B2 (en) * 2019-02-11 2021-06-08 Pqsecure Technologies, Llc Cryptosystem and method using isogeny-based computations to reduce a memory footprint
KR20220012851A (ko) 2019-05-30 2022-02-04 김봉만 대칭 키 암호화/교환을 위한 양자 내성 암호화 및 진보된 암호화 및 키 교환(aeke) 방법
US10880278B1 (en) * 2019-10-03 2020-12-29 ISARA Corporation Broadcasting in supersingular isogeny-based cryptosystems
US11509473B2 (en) 2020-07-20 2022-11-22 Pqsecure Technologies, Llc Architecture and method for hybrid isogeny-based cryptosystems
CN116194977B (zh) * 2020-09-23 2026-03-17 三菱电机株式会社 密码系统、加密装置、解密装置和密钥生成装置
WO2022250656A1 (en) * 2021-05-25 2022-12-01 Pqsecure Technologies, Llc An efficient and scalable architecture and method for isogeny-based cryptosystems
CN113254985B (zh) * 2021-07-15 2021-12-21 北京信安世纪科技股份有限公司 数据加密方法、数据处理方法、数据解密方法及电子设备
US11483151B1 (en) * 2021-07-16 2022-10-25 Pqsecure Technologies, Llc Method and system for computing large-degree isogenies with an odd degree
WO2023055582A1 (en) * 2021-09-30 2023-04-06 Visa International Service Association Round optimal oblivious transfers from isogenies
JP7771003B2 (ja) * 2022-07-01 2025-11-17 株式会社東芝 同種写像計算装置、同種写像計算方法及びプログラム
EP4311161A1 (en) * 2022-07-18 2024-01-24 GMV Soluciones Globales Internet, S.A.U. Method and entity for generating a private key in an identity-based cryptosystem without key escrow
WO2024224646A1 (ja) * 2023-04-28 2024-10-31 日本電信電話株式会社 電子署名システム、電子署名方法及びプログラム
US20250158803A1 (en) * 2023-11-11 2025-05-15 Peter Lablans Encryption Cloaking with a Modified Radix-n Function for Enhanced Security
US12476789B1 (en) * 2024-04-02 2025-11-18 Peter Lablans Computational function transformation (CFT) in computer implemented cryptography
CN121418108B (zh) * 2025-12-23 2026-03-06 合肥国家实验室 基于同源的签名方法、装置、设备、介质

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0233239A (ja) * 1988-07-23 1990-02-02 Nintendo Co Ltd 通信制御装置
US5497423A (en) 1993-06-18 1996-03-05 Matsushita Electric Industrial Co., Ltd. Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication
CA2280906C (en) * 1997-02-07 2010-09-21 Salbu Research And Development (Proprietary) Limited Secure packet radio network
CN1280726A (zh) 1997-12-05 2001-01-17 保密信息技术公司 优化椭圆曲线密码计算的变换方法
US5982892A (en) * 1997-12-22 1999-11-09 Hicks; Christian Bielefeldt System and method for remote authorization for unlocking electronic data
CN1235446A (zh) 1998-03-05 1999-11-17 松下电器产业株式会社 椭圆曲线变换装置、利用装置和利用系统
AU6243899A (en) 1998-09-08 2000-03-27 Citibank, N.A. Elliptic curve cryptosystems for low memory devices
EP1215642A4 (en) 1999-09-08 2004-05-26 Hitachi Ltd METHOD AND ARRANGEMENT FOR THE GENERATION OF ELLIPTIC CURVES, ELLIPTIC ENCRYPTION SYSTEM, AND RECORDING MEDIUM
DE60236094D1 (de) * 2001-08-13 2010-06-02 Univ R Systeme und Verfahren zur Verschlüsselung auf Identitätsbasis und damit zusammenhängende kryptografische Techniken
US7209555B2 (en) * 2001-10-25 2007-04-24 Matsushita Electric Industrial Co., Ltd. Elliptic curve converting device, elliptic curve converting method, elliptic curve utilization device and elliptic curve generating device
US7215780B2 (en) 2001-12-31 2007-05-08 Certicom Corp. Method and apparatus for elliptic curve scalar multiplication

Also Published As

Publication number Publication date
CN100583755C (zh) 2010-01-20
RU2376651C2 (ru) 2009-12-20
TWI360990B (en) 2012-03-21
IL164071A0 (en) 2005-12-18
TW200525979A (en) 2005-08-01
BRPI0404122A (pt) 2005-06-21
JP4809598B2 (ja) 2011-11-09
US20050094806A1 (en) 2005-05-05
AU2004218638A1 (en) 2005-05-19
CO5630049A1 (es) 2006-04-28
RU2004132057A (ru) 2006-04-10
NZ535698A (en) 2006-02-24
AU2004218638B2 (en) 2009-07-30
EP1528705B1 (en) 2009-04-15
KR101098701B1 (ko) 2011-12-23
KR20050042441A (ko) 2005-05-09
US7499544B2 (en) 2009-03-03
CA2483486A1 (en) 2005-05-03
DE602004020565D1 (de) 2009-05-28
HK1085585A1 (en) 2006-08-25
ATE429098T1 (de) 2009-05-15
CN1614922A (zh) 2005-05-11
MY165770A (en) 2018-04-23
EP1528705A1 (en) 2005-05-04
SG111191A1 (en) 2005-05-30
CA2483486C (en) 2013-12-24
MXPA04010155A (es) 2005-05-17
JP2005141200A (ja) 2005-06-02

Similar Documents

Publication Publication Date Title
NO20044028L (no) Bruk av isogenier for utvikling av kryptosystemer
EP1710952B1 (en) Cryptographic Applications of the Cartier Pairing
WO2009134937A3 (en) Format-preserving cryptographic systems
WO2006049832A3 (en) Security device for cryptographic communications
Alsaidi et al. Compression multi-level crypto stego security of texts utilizing colored email forwarding
US20030198348A1 (en) Method and apparatus for encrypting/decrypting data
EP1154348A3 (en) File management apparatus
ATE523017T1 (de) Schlüsselvereinbarungs- und transportprotokoll
TNSN07055A1 (en) Permutation data transform to enhance security
KR101971215B1 (ko) 유효 숫자 연산을 지원하는 동형 암호문의 생성 방법 및 그러한 방법에 의해서 생성된 동형 암호문에 대한 유효 숫자 연산 방법
DE60322909D1 (de) Effiziente verschlüsselung und authentifizierung für datenverarbeitungssysteme
DE60138884D1 (de) Datenübertragungs- un verwaltungsverfahren
TW200618572A (en) Tokens/keys for wireless communications
IL211475A (en) Security Transfer Information Promotions
EP1380917A3 (en) Method and system for validating software code
ATE270800T1 (de) Vorrichtungen und verfahren zur zertifizierung von digitalen unterschriften
US8589679B2 (en) Identifier-based signcryption with two trusted authorities
IL164320A (en) Challenge-based authentication without requiring knowledge of secret authentication data
TW200737889A (en) Asymmetric cryptography with discretionary private key
WO2004064011A3 (en) Method of constructing hyperelliptic curves suitable for cryptographic purposes and cryptographic apparatus using such a method
Viswanath et al. A secure cryptosystem using the decimal expansion of an Irrational number
JP2009278223A (ja) 電子証明システム及び秘匿通信システム
JP4914377B2 (ja) 署名生成装置、署名検証装置、署名生成検証システム、それらの方法及びプログラム
Dhamodharan et al. Multifarious mapping schemes on Elliptic curve cryptography for IoT security
TIWARI A STUDY AND COMPARISON OF THE VARIOUS CRYPTOGRAPHY TECHNIQUE STANDARDS WITHIN FIFTEEN FACTORS.