Secure outsourcing of modular inverses and scalar multiplications on elliptic curves.
Yuan PingXuyang GuoBaocang WangJingxian ZhouPublished in: Int. J. Secur. Networks (2020)
Keyphrases
- elliptic curve
- diffie hellman
- modular exponentiation
- digital signature
- key management
- public key cryptosystems
- public key cryptography
- key distribution
- key exchange
- scalar multiplication
- information technology
- elliptic curve cryptography
- sufficient conditions
- security properties
- service providers
- group communication
- efficient computation
- public key
- ad hoc networks
- secure communication
- power analysis
- wireless sensor networks
- secret sharing scheme
- low cost
- standard model
- encryption scheme
- signature scheme
- fault tolerant
- computational complexity