Cryptographic protocols on real hyperelliptic curves
\`x^2+y_1+z_12^34\`
Advanced Search
Article Contents
Article Contents

Cryptographic protocols on real hyperelliptic curves

Abstract / Introduction Related Papers Cited by
  • We present public-key cryptographic protocols for key exchange, digital signatures, and encryption whose security is based on the presumed intractability of solving the principal ideal problem, or equivalently, the distance problem, in the real model of a hyperelliptic curve. Our protocols represent a significant improvement over existing protocols using real hyperelliptic curves. Theoretical analysis and numerical experiments indicate that they are comparable to the imaginary model in terms of efficiency, and hold much more promise for practical applications than previously believed.
    Mathematics Subject Classification: Primary: 94A60, 14H45; Secondary: 14Q05.

    Citation:

    \begin{equation} \\ \end{equation}
  • 加载中
SHARE

Article Metrics

HTML views() PDF downloads(272) Cited by(0)

Access History

Other Articles By Authors

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return