hyperelliptic curve cryptography
Recently Published Documents


TOTAL DOCUMENTS

20
(FIVE YEARS 4)

H-INDEX

3
(FIVE YEARS 1)

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Ali Muhammad ◽  
Noor Ul Amin ◽  
Insaf Ullah ◽  
Ahmed Alsanad ◽  
Saddam Hussain ◽  
...  

Currently, hyperelliptic curve cryptography (HECC) got attractions towards low power devices such as Industrial Internet of Things (IIoT). As we all know, it has the capability of utilizing low key size, which can be suitable for IIoT environment. Inspired by the aforementioned property of HECC, we proposed an efficient scheme for IIoT using certificateless signature with the help of HECC. The presented approach is proven to be unforgeable against the challenges of type I and type II attackers. We tested the security of the designed approach through Automated Validation of Internet Security Protocols and Applications (AVISPA). We also performed the computational and communicational cost comparisons with already existed schemes, and it is observed from our analysis that our scheme is computationally efficient and needs low communication cost.


2020 ◽  
Vol 2020 ◽  
pp. 1-15 ◽  
Author(s):  
Vani Rajasekar ◽  
J. Premalatha ◽  
K. Sathya

Biometrics combined with cryptography can be employed to solve the conceptual and factual identity frauds in digital authentication. Biometric traits are proven to provide enhanced security for detecting crimes because of its interesting features such as accuracy, stability, and uniqueness. Although diverse techniques have been raised to address this objective, limitations such as higher computational time, minimal accuracy, and maximum recognition time remain. To overcome these challenges, an enhanced iris recognition approach has been proposed based on hyperelliptic curve cryptography (HECC). The proposed study uses the 2D Gabor filter approach for perfect feature extraction in iris preprocessing. A lightweight cryptographic scheme called HECC was employed to encrypt the iris template to avoid intentional attack by the intruders. The benchmark CASIA Iris V-4 and IITD iris datasets were used in the proposed approach for experimental analysis. The result analysis witnessed that the prime objective of the research such as lesser false acceptance rate, lesser false rejection rate, maximum accuracy of 99.74%, maximum true acceptance rate of 100%, and minimal recognition time of 3 seconds has been achieved. Also, it has been identified that the proposed study outperforms other existing well-known techniques.


Sign in / Sign up

Export Citation Format

Share Document