Electron. J. Differential Equations, Vol. 2017 (2017), No. 20, pp. 1-8.

Application of differential cryptography to a GN authentication hierarchy scheme

Alin Ionut Golumbeanu

Starting from the classical differential cryptography, we describe how to construct particular parameters for elliptic curves with application to the domain of information security. These results conclude to a key used on symmetrical encryption. The article will review a solution in which the parties are authenticated based on a secret knowledge and a random parameter.

Submitted August 12, 2016. Published January 16, 2017.
Math Subject Classifications: 35H20, 35S15, 12H20, 11G07.
Key Words: Agreed session key; elliptic curves; public key based encryption; identity based encryption.

Show me the PDF file (248 KB), TEX file for this article.

Alin Ionut Golumbeanu
University of Craiova
Street: A.I. Cuza 13
200585 Craiova, Romania
email: alin.golumbeanu@inf.ucv.ro

Return to the EJDE web page