Education, Science, Technology, Innovation and Life
Open Access
Sign In

Application and Research of Algebraic Curve in Identity Authentication Security

Download as PDF

DOI: 10.23977/jeis.2025.100111 | Downloads: 13 | Views: 587

Author(s)

Xiaoyan Li 1, Shi Wang 1

Affiliation(s)

1 Hainan Vocational University of Science and Technology, Haikou, Hainan, China

Corresponding Author

Xiaoyan Li

ABSTRACT

In the field of information security, the security of identity authentication is crucial. We focus on the application of algebraic curves in the field of identity authentication security and explore their core content in depth. Starting from the basic theory of algebraic curves, we explain the group structure and discrete logarithmic properties of elliptic curves. Then, we conduct a detailed analysis of its application mode, including key generation, encryption and decryption, and digital signature processes based on elliptic curve cryptography (ECC). This is aimed at building a secure defense line for identity authentication. Meanwhile, by using algebraic curves to construct a zero - knowledge identity authentication protocol, we can achieve identity verification under privacy protection. Compared to traditional methods, this application has obvious advantages and can effectively resist quantum computing attacks, improving efficiency with shorter key lengths and faster computation speeds. However, in the process of application promotion, there are challenges such as the urgent need to complete mathematical theories, optimize algorithms, and ensure compatibility.Conduct research on the application of algebraic curves in identity authentication security, providing both theoretical foundations and practical guidance for promoting technological innovation in this field and further enhancing the security and reliability of identity authentication.

KEYWORDS

Algebraic curve; Elliptic curve cryptography (ECC); Identity authentication; information security

CITE THIS PAPER

Xiaoyan Li, Shi Wang, Application and Research of Algebraic Curve in Identity Authentication Security. Journal of Electronics and Information Science (2025) Vol. 10: 82-88. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2025.100111.

REFERENCES

[1] V. Gopar Processor, system, method, and device for secure elliptic curve cryptography instructions: CN201780045957.X[P].CN109479003B[2025-02-26].
[2] Liu Ziyao, Chen Jianhua, Wei Yongshuang Authentication Protocol Based on Elliptic Curve Cryptography in Multi Server Environment [J]. Journal of Mathematics, 2024, 44(3):212-224.
[3] Yang Guotao, Cao Chong, Han Tao, etc Password security authentication method based on hybrid encryption in the Internet of Things [J]. Application of microcontrollers and embedded systems, 2024,  000(4):7.
[4] Yang Qing, Wang Haoxuan, Liang Lei, etc Improved elliptic curve digital signature scheme and case analysis [J]. Computer applications and software, 2023, 40(1):327-330.
[5] Lin Tingting Secure execution of elliptic curve cryptography processes CN202210111179.2[2025-02-26].
[6] Dong Jiankuo, Liu Zhe, Lu Sheng, etc Research progress on efficient software implementation technology of elliptic curve cryptography [J]. Journal of Computer Science, 2023, 46 (5): 909-928.

Downloads: 12710
Visits: 493273

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.