Abstract
Elliptic curve cryptography (ECC) is extensively applied in various security protocols for authentication and key management. ECC is a public key or asymmetric key cryptographic approach which is based on elliptic curve theory. ECC was introduced to minimize computational costs while providing equal and faster layers of security than other familiar operations (such as modular exponentiation) and with smaller keys. The technique of ECC has numerous applications in authentication protocols concerning RFIDs, digital signatures, wireless sensor networks, smart cards, and other authentication techniques. In this chapter, we describe the utilization of ECC for designing security protocols in terms of authentication, key establishment, signcryption, and secure group communication.
| Original language | English |
|---|---|
| Title of host publication | IoT Security: Advances in Authentication |
| Publisher | John Wiley & Sons, Ltd |
| Pages | 85-99 |
| Number of pages | 15 |
| ISBN (Electronic) | 9781119527978 |
| ISBN (Print) | 9781119527923 |
| DOIs | |
| Publication status | Published - Feb 2020 |
Bibliographical note
Publisher Copyright:© 2020 John Wiley & Sons Ltd. All rights reserved.
Fingerprint
Dive into the research topics of 'Public Key Based Protocols–EC Crypto'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver