Elgamal Elliptic Curve Based Secure Communication Architecture for Microgrids
نویسندگان
چکیده
منابع مشابه
A Secure & Verifiable Technique for Secure Communication using Elliptic Curve
During the transmission of data from sender prevents from various attacks. Public key encryption is a technique which provides encryption of data using public key. The existing technique implemented for the searching of keywords with public key encryption provides security from password Guessing attacks [1]. But the technique implemented here enables security from various attacks as fine as als...
متن کاملRSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs
A Mobile Ad hoc Network (MANET) consists of multiple wireless mobile devices that form a network on the fly to allow communication with each other without any infrastructure. Due to its nature, providing security in these networks is challenging. Threshold Cryptography (TC) provides a promise of securing these networks. In this paper, we discuss our RSA-based Threshold Cryptography (RSA-TC) and...
متن کاملAn On-chip Data Storage with ElGamal Elliptic Curve Cryptosystems
An On-chip Data Storage with cryptosystem proposed in this paper was designed for modern smart card system and “on the fly data encryption/decryption”. To ensure the security, the ElGamal Elliptic curve cryptosystems with the key size of 176 bits was embeded. The design can be configured to be either the encrypter or the decryptor with simple control signals. To minimize the hardware cost, size...
متن کاملAn efficient semantically secure elliptic curve cryptosystem based on KMOV
We propose an elliptic curve scheme over the ring Zn2 , which is efficient and semantically secure in the standard model. There appears to be no previous elliptic curve cryptosystem based on factoring that enjoys both of these properties. The KMOV scheme has been used as an underlying primitive to obtain efficiency and probabilistic encryption. Semantic security of the scheme is based on a new ...
متن کاملSecure Delegation of Elliptic-Curve Pairing
In this paper we describe a simple protocol for secure delegation of the elliptic-curve pairing. A computationally limited device (typically a smart-card) will delegate the computation of the pairing e(A, B) to a more powerful device (for example a PC), in such a way that 1) the powerful device learns nothing about the points A and B, and 2) the limited device is able to detect when the powerfu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Energies
سال: 2018
ISSN: 1996-1073
DOI: 10.3390/en11040759