• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

相似文献

1
Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016.PLOS ONE 2016 中提出的嵌入度为 1 的椭圆曲线的安全性分析。
PLoS One. 2019 Feb 19;14(2):e0212310. doi: 10.1371/journal.pone.0212310. eCollection 2019.
2
Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.构建嵌入度为1的配对友好椭圆曲线以保障关键基础设施安全。
PLoS One. 2016 Aug 26;11(8):e0161857. doi: 10.1371/journal.pone.0161857. eCollection 2016.
3
Fast parallel molecular algorithms for DNA-based computation: solving the elliptic curve discrete logarithm problem over GF2.用于基于DNA计算的快速并行分子算法:解决GF2上的椭圆曲线离散对数问题。
J Biomed Biotechnol. 2008;2008:518093. doi: 10.1155/2008/518093.
4
Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications.用于高速密码应用的采用组合群运算的并行点乘架构。
PLoS One. 2017 May 1;12(5):e0176214. doi: 10.1371/journal.pone.0176214. eCollection 2017.
5
Extending the IEEE 802.15.4 security suite with a compact implementation of the NIST P-192/B-163 elliptic curves.将 NIST P-192/B-163 椭圆曲线的紧凑实现扩展到 IEEE 802.15.4 安全套件中。
Sensors (Basel). 2013 Jul 29;13(8):9704-28. doi: 10.3390/s130809704.
6
A secure and efficient certificateless content extraction signature with privacy protection.一种具有隐私保护的安全高效的无证书内容提取签名方案。
PLoS One. 2021 Nov 1;16(11):e0258907. doi: 10.1371/journal.pone.0258907. eCollection 2021.
7
A Novel Image Encryption Scheme Based on Elliptic Curves over Finite Rings.一种基于有限环上椭圆曲线的新型图像加密方案。
Entropy (Basel). 2022 Apr 19;24(5):571. doi: 10.3390/e24050571.
8
Provably-secure (Chinese government) SM2 and simplified SM2 key exchange protocols.可证明安全的(中国政府)SM2及简化SM2密钥交换协议。
ScientificWorldJournal. 2014;2014:825984. doi: 10.1155/2014/825984. Epub 2014 Sep 2.
9
Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems.椭圆曲线密码学在保障自动化和监控系统安全中的考虑因素。
Sensors (Basel). 2023 Mar 1;23(5):2686. doi: 10.3390/s23052686.
10
An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System.基于超椭圆曲线公钥密码学的高效广义群组密钥协议的改进认证与安全方案在物联网医疗保健系统中的应用。
J Med Syst. 2019 Jul 2;43(8):260. doi: 10.1007/s10916-019-1378-2.

本文引用的文献

1
Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.构建嵌入度为1的配对友好椭圆曲线以保障关键基础设施安全。
PLoS One. 2016 Aug 26;11(8):e0161857. doi: 10.1371/journal.pone.0161857. eCollection 2016.

PLOS ONE 2016 中提出的嵌入度为 1 的椭圆曲线的安全性分析。

Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016.

机构信息

Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology, Aomi, Koto-ku, Tokyo, Japan.

出版信息

PLoS One. 2019 Feb 19;14(2):e0212310. doi: 10.1371/journal.pone.0212310. eCollection 2019.

DOI:10.1371/journal.pone.0212310
PMID:30779766
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC6380619/
Abstract

Wang et al. proposed a method for obtaining elliptic curves with embedding degree 1 for securing critical infrastructures, and presented several elliptic curves generated by their method with torsion points of 160 bits and 189 bits orders. They also presented some experimental results and claimed that their implementation of an elliptic curve generated with their method is faster than an implementation for embedded devices presented by Bertoni et al. In this paper, we point out that the security and efficiency claims given by Wang et al. are flawed. Specifically, we show that it is possible to solve finite field discrete logarithm problems defined over their elliptic curves in practice. On the elliptic curves with torsion points of 160 bits orders generated by Wang et al., their instances of finite field discrete logarithm problems are solved in around 4 hours by using a standard desktop PC. On the torsion points of 189 bits orders, their instances are solved in around 10 days by using two standard desktop PCs. The hardness of the finite field discrete logarithm problems is one of the most important bases of security; therefore, their elliptic curves should not be used for cryptographic purposes.

摘要

Wang 等人提出了一种获得嵌入度为 1 的椭圆曲线的方法,用于保护关键基础设施,并展示了他们的方法生成的具有 160 位和 189 位阶的扭点的几个椭圆曲线。他们还展示了一些实验结果,并声称他们实现的基于他们的方法生成的椭圆曲线比 Bertoni 等人提出的用于嵌入式设备的实现更快。在本文中,我们指出 Wang 等人给出的安全和效率的说法是有缺陷的。具体来说,我们表明,在实践中,可以解决他们的椭圆曲线上定义的有限域离散对数问题。对于 Wang 等人生成的 160 位阶扭点的椭圆曲线,使用标准桌面 PC 在大约 4 小时内解决了他们的有限域离散对数问题的实例。对于 189 位阶的扭点,使用两台标准桌面 PC 在大约 10 天内解决了他们的实例。有限域离散对数问题的难度是安全性的最重要基础之一;因此,他们的椭圆曲线不应该用于加密目的。