Related Concepts
Definition
Elliptic curve public-key encryption schemes rely on the properties of elliptic curves for public-key encryption and decryption. An elliptic curve analogue of ElGamal public-key encryption is described.
Applications
In ECIES, the elliptic curve domain parameters are \(D = (q,\mbox{ FR},S,a,b,P,n,h)\), and an entity A’s key pair is (d, Q) (Elliptic Curve Keys). Edenotes a symmetric-key encryption scheme such as the AdvancedEncryption Standard (AES), and Message Authentication Code (MAC)denotes a message authentication code algorithm such as HashedMessage Authentication Code (HMAC). In order to encrypt a messagem toA, anentity Bdoes...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Abdalla M, Bellare M, Rogaway P (2001) The oracle Diffie–Hellman assumptions and an analysis of DHIES. Topics in cryptology—CT-RSA 2001, Lecture Notes in Computer Science, vol 2020. Springer, Berlin, pp 143–158
Cramer R, Shoup V (1998) A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. Advances in cryptology—CRYPTO ’98, Lecture Notes in Computer Science, vol 1462. Springer, Berlin, pp 13–25
ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31:469–472
ISO/IEC 18033-2 (2006) Information Technology – Security Techniques – Encryption algorithms – Part 2: asymmetric ciphers
Rackoff C, Simon D (1992) Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. Advances in Cryptology—CRYPTO ’91, Lecture Notes in Computer Science, vol 576. Springer, pp 433–444
Shoup V (ed) (2004) FCD 18033-2 Encryption algorithms Part 2: asymmetric ciphers. http://www.shoup.net/iso
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Hankerson, D., Menezes, A. (2011). Elliptic Curve Public-Key Encryption Schemes. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_250
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_250
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering