Paper Title:
Optimized E-Cash Scheme and its Formal Analysis
  Abstract

HCC (Hyper-elliptic Curves Cryptosystem) is a typical public key cryptosystem with high efficiency and security. In the paper, we introduced HCC into the designing of e-cash schemes and presented an improved e-cash scheme with formal security analysis. The basic cryptography algorithms in e-cash are based on the complexity of HCDLP (Hyper-elliptic Curves Discrete Logarithm Problem).This designing strategy improves the efficiency for software and hardware application and effectively reinforces the security of e-cash. Dishonest users and outer adversaries can not attack secret parameters with feasible polynomial algorithms. As for scheme analyzing, we presented subliminal channel in signature to attack the IND-CCA2 property of the e-cash scheme, the subliminal channel algorithms can not attack the private keys or secret parameters with polynomial complexity either. Therefore, the scheme proves to be feasible for application with high efficiency and security.

  Info
Periodical
Advanced Materials Research (Volumes 204-210)
Edited by
Helen Zhang, Gang Shen and David Jin
Pages
1322-1325
DOI
10.4028/www.scientific.net/AMR.204-210.1322
Citation
X. W. Zhou, Y. Fu, "Optimized E-Cash Scheme and its Formal Analysis", Advanced Materials Research, Vols. 204-210, pp. 1322-1325, 2011
Online since
February 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Xuan Wu Zhou
Abstract:Compared with symmetric cryptosystem, asymmetric cryptosystem has much superiority in many application cases. Yet, the computation in a...
505
Authors: Xuan Wu Zhou
Abstract:In the paper, we analyzed the system optimization algorithms in e-cash (electronic cash) by improving the efficiency of e-cash for software...
532
Authors: Xuan Wu Zhou
Abstract:As a typical fast public key cryptosystem, HCC (Hyper-elliptic Curves Cryptosystem) provides efficient asymmetric algorithms for cryptography...
546
Authors: Xuan Wu Zhou
Abstract:Public verifiability in signcryption achieves public verification of signature by a trustable third party; it ensures the reliability and...
706
Authors: Xuan Wu Zhou, Yan Fu
Abstract:Discrete logarithm problem is an important trapdoor function to design asymmetric cryptosystem, and some fast public key cryptosystems have...
1318