首页> 美国卫生研究院文献>Sensors (Basel Switzerland) >iTrust—A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography
【2h】

iTrust—A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography

机译:ITRUST-A Queltworthy且有效的椭圆曲线密码映射方案

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Recently, many platforms have outsourced tasks to numerous smartphone devices known as Mobile Crowd-sourcing System (MCS). The data is collected and transferred to the platform for further analysis and processing. These data needs to maintain confidentiality while moving from smartphones to the platform. Moreover, the limitations of computation resources in smartphones need to be addressed to balance the confidentiality of the data and the capabilities of the devices. For this reason, elliptic curve cryptography (ECC) is accepted, widespread, and suitable for use in limited resources environments such as smartphone devices. ECC reduces energy consumption and maximizes devices’ efficiency by using small crypto keys with the same strength of the required cryptography of other cryptosystems. Thus, ECC is the preferred approach for many environments, including the MCS, Internet of Things (IoT) and wireless sensor networks (WSNs). Many implementations of ECC increase the process of encryption and/or increase the space overhead by, for instance, incorrectly mapping points to EC with extra padding bits. Moreover, the wrong mapping method used in ECC results in increasing the computation efforts. This study provides comprehensive details about the mapping techniques used in the ECC mapping phase, and presents performance results about widely used elliptic curves. In addition, it suggests an optimal enhanced mapping method and size of padding bit to secure communications that guarantee the successful mapping of points to EC and reduce the size of padding bits.
机译:最近,许多平台将外包任务有许多称为移动人群采购系统(MCS)的智能手机设备。收集数据并转移到平台以进行进一步分析和处理。这些数据需要在从智能手机到平台的同时保持机密性。此外,需要解决智能手机中的计算资源的局限性以平衡数据的机密性和设备的能力。因此,椭圆曲线密码(ECC)被接受,广泛,适用于智能手机设备等有限的资源环境中使用。 ECC通过使用其他密码系统所需加密强度相同强度的小密码键来降低能量消耗并最大限度地提高设备的效率。因此,ECC是许多环境的优选方法,包括MCS,物联网(IOT)和无线传感器网络(WSN)。 ECC的许多实施方式增加了加密过程和/或通过具有额外填充位的额外填充位的不正确映射点来增加空间开销。此外,ECC中使用的错误映射方法导致增加计算工作。本研究提供了有关ECC映射阶段中使用的映射技术的全面细节,并且具有关于广泛使用的椭圆曲线的性能结果。此外,它表明了一种最佳增强型映射方法和填充位的大小,以确保能够成功地映射到EC的成功映射并降低填充比特的大小。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号