...
首页> 外文期刊>Advances in mathematics of communications >Invalid-curve attacks on (hyper)elliptic curve cryptosystems
【24h】

Invalid-curve attacks on (hyper)elliptic curve cryptosystems

机译:对(超)椭圆曲线密码系统的无效曲线攻击

获取原文
获取原文并翻译 | 示例
           

摘要

We extend the notion of an invalid-curve attack from elliptic curves to genus 2 hyperelliptic curves. We also show that invalid singular (hyper)elliptic curves can be used in mounting invalid-curve attacks on (hyper)elliptic curve cryptosystems, and make quantitative estimates of the practicality of these attacks. We thereby show that proper key validation is necessary even in cryptosystems based on hyperelliptic curves. As a byproduct, we enumerate the isomorphism classes of genus g hyperelliptic curves over a finite field by a new counting argument that is simpler than the previous methods.
机译:我们将无效曲线攻击的概念从椭圆曲线扩展到2类超椭圆曲线。我们还表明,无效的奇异(超)椭圆曲线可用于在(超)椭圆曲线密码系统上进行无效曲线攻击,并对这些攻击的实用性进行定量估计。因此,我们证明即使在基于超椭圆​​曲线的密码系统中,也需要适当的密钥验证。作为副产品,我们通过比以前方法更简单的新计数参数枚举了有限域上的g类超椭圆曲线的同构类。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号