Skip to main content

Elliptic Curve Public-Key Encryption Schemes

  • Reference work entry
Encyclopedia of Cryptography and Security

Related Concepts

ElGamal Public Key Encryption; Elliptic Curve Cryptography

Definition

Elliptic curve public-key encryption schemes rely on the properties of elliptic curves for public-key encryption and decryption. An elliptic curve analogue of ElGamal public-key encryption is described.

Background

It is possible to develop elliptic curve analogues of all the variants of the ElGamal public-key encryption scheme [3]. Described here is one such variant, the Elliptic Curve Integrated Encryption Scheme (ECIES), proposed by Abdalla, Bellare, and Rogaway [1].

Applications

In ECIES, the elliptic curve domain parameters are \(D = (q,\mbox{ FR},S,a,b,P,n,h)\), and an entity A’s key pair is (d, Q) (Elliptic Curve Keys). Edenotes a symmetric-key encryption scheme such as the AdvancedEncryption Standard (AES), and Message Authentication Code (MAC)denotes a message authentication code algorithm such as HashedMessage Authentication Code (HMAC). In order to encrypt a messagem toA, anentity Bdoes...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Abdalla M, Bellare M, Rogaway P (2001) The oracle Diffie–Hellman assumptions and an analysis of DHIES. Topics in cryptology—CT-RSA 2001, Lecture Notes in Computer Science, vol 2020. Springer, Berlin, pp 143–158

    Google Scholar 

  2. Cramer R, Shoup V (1998) A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. Advances in cryptology—CRYPTO ’98, Lecture Notes in Computer Science, vol 1462. Springer, Berlin, pp 13–25

    Google Scholar 

  3. ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31:469–472

    Article  MATH  MathSciNet  Google Scholar 

  4. ISO/IEC 18033-2 (2006) Information Technology â€“ Security Techniques â€“ Encryption algorithms â€“ Part 2: asymmetric ciphers

    Google Scholar 

  5. Rackoff C, Simon D (1992) Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. Advances in Cryptology—CRYPTO ’91, Lecture Notes in Computer Science, vol 576. Springer, pp 433–444

    Google Scholar 

  6. Shoup V (ed) (2004) FCD 18033-2 Encryption algorithms Part 2: asymmetric ciphers. http://www.shoup.net/iso

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Hankerson, D., Menezes, A. (2011). Elliptic Curve Public-Key Encryption Schemes. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_250

Download citation

Publish with us

Policies and ethics