Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey
From MaRDI portal
Publication:6101318
DOI10.1016/j.cosrev.2022.100530MaRDI QIDQ6101318
Mahwish Yousaf, Shamsher Ullah, Muhammad Tanveer Hussain, Jiangbin Zheng, Farhan Ullah, Nizamud Din
Publication date: 20 June 2023
Published in: Computer Science Review (Search for Journal in Brave)
elliptic curvesdiscrete logarithm problemelliptic curve cryptographyattribute-based encryptionidentity based encryptionDiffie-Hellman key exchange protocolelliptic curve digital signaturebi-linearity
Research exposition (monographs, survey articles) pertaining to computer science (68-02) Computer science (68-XX)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- How to construct efficient signcryption schemes on elliptic curves
- A new image encryption algorithm based on hyper-chaos
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Efficient signature generation by smart cards
- Cryptanalysis of multiple modes of operation
- Identity-based encryption from the Diffie-Hellman assumption
- Image encryption: generating visually meaningful encrypted images
- Message recovery for signature schemes based on the discrete logarithm problem
- A provably secure proxy signcryption scheme using bilinear pairings
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Identity-Based Cryptosystems and Signature Schemes
- Identity-Based Encryption with Outsourced Revocation in Cloud Computing
- Unbounded HIBE and Attribute-Based Encryption
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Attribute-Based Encryption for Circuits
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Elliptic Curve Cryptosystems
- A method for obtaining digital signatures and public-key cryptosystems
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Memory encryption
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Pairing-Friendly Elliptic Curves of Prime Order
- Advances in Cryptology - CRYPTO 2003
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
- Attribute-based encryption for circuits
- Public Key Cryptography - PKC 2005
- Public Key Cryptography - PKC 2005
- Information Security and Cryptology - ICISC 2003
- Theory of Cryptography
- Selecting cryptographic key sizes
- Discrete logarithm problems with auxiliary inputs
This page was built for publication: Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey