Electron. J. Differential Equations, Vol. 2017 (2017), No. 20, pp. 1-8.

Application of differential cryptography to a GN authentication hierarchy scheme

Alin Ionut Golumbeanu

Abstract:
Starting from the classical differential cryptography, we describe how to construct particular parameters for elliptic curves with application to the domain of information security. These results conclude to a key used on symmetrical encryption. The article will review a solution in which the parties are authenticated based on a secret knowledge and a random parameter.

Submitted August 12, 2016. Published January 16, 2017.
Math Subject Classifications: 35H20, 35S15, 12H20, 11G07.
Key Words: Agreed session key; elliptic curves; public key based encryption; identity based encryption.

Show me the PDF file (248 KB), TEX file for this article.

Alin Ionut Golumbeanu
University of Craiova
Street: A.I. Cuza 13
200585 Craiova, Romania
email: alin.golumbeanu@inf.ucv.ro

Return to the EJDE web page