Application and Research of Algebraic Curve in Identity Authentication Security
DOI: 10.23977/jeis.2025.100111 | Downloads: 13 | Views: 587
Author(s)
Xiaoyan Li 1, Shi Wang 1
Affiliation(s)
1 Hainan Vocational University of Science and Technology, Haikou, Hainan, China
Corresponding Author
Xiaoyan LiABSTRACT
In the field of information security, the security of identity authentication is crucial. We focus on the application of algebraic curves in the field of identity authentication security and explore their core content in depth. Starting from the basic theory of algebraic curves, we explain the group structure and discrete logarithmic properties of elliptic curves. Then, we conduct a detailed analysis of its application mode, including key generation, encryption and decryption, and digital signature processes based on elliptic curve cryptography (ECC). This is aimed at building a secure defense line for identity authentication. Meanwhile, by using algebraic curves to construct a zero - knowledge identity authentication protocol, we can achieve identity verification under privacy protection. Compared to traditional methods, this application has obvious advantages and can effectively resist quantum computing attacks, improving efficiency with shorter key lengths and faster computation speeds. However, in the process of application promotion, there are challenges such as the urgent need to complete mathematical theories, optimize algorithms, and ensure compatibility.Conduct research on the application of algebraic curves in identity authentication security, providing both theoretical foundations and practical guidance for promoting technological innovation in this field and further enhancing the security and reliability of identity authentication.
KEYWORDS
Algebraic curve; Elliptic curve cryptography (ECC); Identity authentication; information securityCITE THIS PAPER
Xiaoyan Li, Shi Wang, Application and Research of Algebraic Curve in Identity Authentication Security. Journal of Electronics and Information Science (2025) Vol. 10: 82-88. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2025.100111.
REFERENCES
[1] V. Gopar Processor, system, method, and device for secure elliptic curve cryptography instructions: CN201780045957.X[P].CN109479003B[2025-02-26].
[2] Liu Ziyao, Chen Jianhua, Wei Yongshuang Authentication Protocol Based on Elliptic Curve Cryptography in Multi Server Environment [J]. Journal of Mathematics, 2024, 44(3):212-224.
[3] Yang Guotao, Cao Chong, Han Tao, etc Password security authentication method based on hybrid encryption in the Internet of Things [J]. Application of microcontrollers and embedded systems, 2024, 000(4):7.
[4] Yang Qing, Wang Haoxuan, Liang Lei, etc Improved elliptic curve digital signature scheme and case analysis [J]. Computer applications and software, 2023, 40(1):327-330.
[5] Lin Tingting Secure execution of elliptic curve cryptography processes CN202210111179.2[2025-02-26].
[6] Dong Jiankuo, Liu Zhe, Lu Sheng, etc Research progress on efficient software implementation technology of elliptic curve cryptography [J]. Journal of Computer Science, 2023, 46 (5): 909-928.
Downloads: | 12710 |
---|---|
Visits: | 493273 |
Sponsors, Associates, and Links
-
Information Systems and Signal Processing Journal
-
Intelligent Robots and Systems
-
Journal of Image, Video and Signals
-
Transactions on Real-Time and Embedded Systems
-
Journal of Electromagnetic Interference and Compatibility
-
Acoustics, Speech and Signal Processing
-
Journal of Power Electronics, Machines and Drives
-
Journal of Electro Optics and Lasers
-
Journal of Integrated Circuits Design and Test
-
Journal of Ultrasonics
-
Antennas and Propagation
-
Optical Communications
-
Solid-State Circuits and Systems-on-a-Chip
-
Field-Programmable Gate Arrays
-
Vehicular Electronics and Safety
-
Optical Fiber Sensor and Communication
-
Journal of Low Power Electronics and Design
-
Infrared and Millimeter Wave
-
Detection Technology and Automation Equipment
-
Journal of Radio and Wireless
-
Journal of Microwave and Terahertz Engineering
-
Journal of Communication, Control and Computing
-
International Journal of Surveying and Mapping
-
Information Retrieval, Systems and Services
-
Journal of Biometrics, Identity and Security
-
Journal of Avionics, Radar and Sonar