http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Performance Study of genus 3 Hyperelliptic Curve Cryptosystem
Gupta, Daya,De, Asok,Chatterjee, Kakali Korea Information Processing Society 2012 Journal of information processing systems Vol.8 No.1
Hyperelliptic Curve Cryptosystem (HECC) is well suited for all kinds of embedded processor architectures, where resources such as storage, time, or power are constrained due to short operand sizes. We can construct genus 3 HECC on 54-bit finite fields in order to achieve the same security level as 160-bit ECC or 1024-bit RSA due to the algebraic structure of Hyperelliptic Curve. This paper explores various possible attacks to the discrete logarithm in the Jacobian of a Hyperelliptic Curve (HEC) and addition and doubling of the divisor using explicit formula to speed up the scalar multiplication. Our aim is to develop a cryptosystem that can sign and authenticate documents and encrypt / decrypt messages efficiently for constrained devices in wireless networks. The performance of our proposed cryptosystem is comparable with that of ECC and the security analysis shows that it can resist the major attacks in wireless networks.
An improved privacy preservation technique in health-cloud
Mayank Kumar Kundalwal,Kakali Chatterjee,Ashish Singh 한국통신학회 2019 ICT Express Vol.5 No.3
In today’s cloud computing environment, health-cloud preserve the person specific sensitive information for several purposes such as bio-medical research, health insurance companies, medical data analysis, etc. When any authorized person access these clouds, the released data should not compromise any individuals’ privacy and it remains useful as well. In the health-cloud system, the data must be released in such a way that any individuals’ identity cannot be revealed. The database management system alone cannot ensure any individual’s privacy. The Access Control (AC) models are also not able to protect the data from indirect access or multiple queries. To remove such issues inference control is one of the techniques which ensures the data confidentiality from indirect data access. In this paper, we have proposed a hybrid technique which includes two different inference control techniques, query set size restriction and k-anonymity to ensure individuals’ privacy. A query set size restriction is used to prevent the sensitive data from inference attacks, whereas k-anonymity is implemented to protect the data from linking attacks. Both these techniques reach a certain privacy level with satisfactory data utilization. We have also generated a rule set to increase the privacy of healthcare data.
Performance Study of genus 3 Hyperelliptic Curve Cryptosystem
( Daya Gupta ),( Asok De ),( Kakali Chatterjee ) 한국정보처리학회 2012 Journal of information processing systems Vol.8 No.1
Hyperelliptic Curve Cryptosystem (HECC) is well suited for all kinds of embedded processor architectures, where resources such as storage, time, or power are constrained due to short operand sizes, We can construct genus 3 HECC on 54-bit finite fields in order to achieve the same security level as 160-bit ECC or 1024-bit RSA due to the algebraic structure of Hyperelliptic Curve. This paper explores various possible attacks to the discrete logarithm in the Jacobian of a Hyperelliptic Curve (HEC) and addition and doubling of the divisor using explicit formula to speed up the scalar multiplication. Our aim is to develop a cryptosystem that can sign and authenticate documents and encrypt / decrypt messages efficiently for constrained devices in wireless networks. The performance of our proposed cryptosystem is comparable with that of ECC and the security analysis shows that it can resist the major attacks in wireless networks.