Paper
1 October 2018 Partially homomorphic encryption algorithm based on elliptic curves
Roman N. Kvetny, Yevhenii A. Titarchuk, Volodymyr Y. Kotsiubynskyi, Waldemar Wójcik, Nursanat Askarova
Author Affiliations +
Proceedings Volume 10808, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2018; 108082H (2018) https://doi.org/10.1117/12.2501583
Event: Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2018, 2018, Wilga, Poland
Abstract
In this work, partially homomorphic encryption algorithm based on elliptic curves is implemented. The established algorithm allows performing operations of encryption, addition and decryption of various aspects of the system. One of the possible applications of the algorithm is the creation of the depersonalization protocol in the electronic voting systems with different scales. The mathematical model of algorithm and mathematical models of basic analogues, among which it is possible to distinguish the algorithm of Paillier, which is also homomorphic according to the addition operation, are given. Comparison of fast-acting is executed between the algorithm based on elliptic curves and algorithm of Paillier at correlative cryptoproof lengths of the keys.
© (2018) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Roman N. Kvetny, Yevhenii A. Titarchuk, Volodymyr Y. Kotsiubynskyi, Waldemar Wójcik, and Nursanat Askarova "Partially homomorphic encryption algorithm based on elliptic curves", Proc. SPIE 10808, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2018, 108082H (1 October 2018); https://doi.org/10.1117/12.2501583
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Symmetric-key encryption

Data storage

Evolutionary algorithms

Algorithm development

Mathematical modeling

Cryptography

Clouds

Back to Top