Synonyms
Definition
Elliptic curve cryptography (ECC) encompasses the design and analysis of public key cryptographic schemes that can be implemented using elliptic curves.
Background
Elliptic curve cryptographic schemes were proposed independently in 1985 by Neal Koblitz (Koblitz, 1987) and Victor Miller (Miller, 1986). They are the elliptic curve analogues of schemes based on the discrete logarithm problem where the underlying group is the group of points on an elliptic curve defined over a finite field (Blake et al., 1999; Hankerson et al., 2004). See Koblitz et al. (2011) for a historical account of the development and commercial acceptance of elliptic curve cryptography.
Theory
The security of all elliptic curve signature schemes, elliptic curve key agreement schemes, and elliptic curve public-key encryption schemes is based on the apparent intractability of the elliptic curve discrete logarithm problem (ECDLP). Unlike the case of the ordinary discrete logarithm problemin...
References
Blake I, Seroussi G, Smart N (1999) Elliptic curves in cryptography. Cambridge University Press, Cambridge
Cohen H, Frey G, Avanzi R, Doche C, Lange T, Nguyen K, Vercauteren F (2005) Handbook of elliptic and hyperelliptic curve cryptography. Chapman & Hall/CRC, Boca Ratonx
Hankerson D, Menezes A, Vanstone S (2004) Guide to elliptic curve cryptography. Springer, New York
Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48:203–209
Koblitz AH, Koblitz N, Menezes A (2011) Elliptic curve cryptography: the serpentine course of a paradigm shift. J Number Theory 131:781–814
Miller V (1986) Use of elliptic curves in cryptography. In: Advances in cryptology—CRYPTO’85. Lecture notes in computer science, vol 218. Springer, pp 417–426
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2021 Springer Science+Business Media LLC
About this entry
Cite this entry
Hankerson, D., Menezes, A. (2021). Elliptic Curve Cryptography. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_245-2
Download citation
DOI: https://doi.org/10.1007/978-3-642-27739-9_245-2
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27739-9
Online ISBN: 978-3-642-27739-9
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering