Next Article in Journal
Progress in the Prediction of Entropy Generation in Turbulent Reacting Flows Using Large Eddy Simulation
Next Article in Special Issue
Extreme Value Laws for Superstatistics
Previous Article in Journal
Entropy of Closure Operators and Network Coding Solvability
Previous Article in Special Issue
Measures of Causality in Complex Datasets with Application to Financial Data
Open AccessArticle

Nonlinearities in Elliptic Curve Authentication

1
Department of Mathematics, Faculty of Science, King Abdulaziz University, Jeddah Campus, P.O. Box 80203, Jeddah 21589, Saudi Arabia
2
Department of Informatics, University of Craiova, Street A.I Cuza 13, 200585 Craiova, Romania
3
Institute of Mathematics "Simion Stoilow" of the Romanian Academy, P.O. Box 1-764, 014700 Bucharest, Romania
*
Author to whom correspondence should be addressed.
Entropy 2014, 16(9), 5144-5158; https://doi.org/10.3390/e16095144
Received: 2 September 2014 / Accepted: 19 September 2014 / Published: 25 September 2014
(This article belongs to the Collection Advances in Applied Statistical Mechanics)
In order to construct the border solutions for nonsupersingular elliptic curve equations, some common used models need to be adapted from linear treated cases for use in particular nonlinear cases. There are some approaches that conclude with these solutions. Optimization in this area means finding the majority of points on the elliptic curve and minimizing the time to compute the solution in contrast with the necessary time to compute the inverse solution. We can compute the positive solution of PDE (partial differential equation) like oscillations of f(s)/s around the principal eigenvalue λ1 of -Δ in H 0 1 (Ω).Translating mathematics into cryptographic applications will be relevant in everyday life, where in there are situations in which two parts that communicate need a third part to confirm this process. For example, if two persons want to agree on something they need an impartial person to confirm this agreement, like a notary. This third part does not influence in anyway the communication process. It is just a witness to the agreement. We present a system where the communicating parties do not authenticate one another. Each party authenticates itself to a third part who also sends the keys for the encryption/decryption process. Another advantage of such a system is that if someone (sender) wants to transmit messages to more than one person (receivers), he needs only one authentication, unlike the classic systems where he would need to authenticate himself to each receiver. We propose an authentication method based on zero-knowledge and elliptic curves. View Full-Text
Keywords: partial differential equation; elliptic curve; zero knowledge; authentication partial differential equation; elliptic curve; zero knowledge; authentication
MDPI and ACS Style

Alsaedi, R.; Constantinescu, N.; Rādulescu, V. Nonlinearities in Elliptic Curve Authentication. Entropy 2014, 16, 5144-5158.

Show more citation formats Show less citations formats

Article Access Map by Country/Region

1
Only visits after 24 November 2015 are recorded.
Search more from Scilit
 
Search
Back to TopTop