ELLIPTIC CURVES PUBLIC KEY TRAITOR TRACING SCHEME

In this paper we use the elliptic curves system in the Public Key Traitor Tracing Scheme. The Elliptic Curve points form Abelian group that used in the Public Key Traitor Tracing Scheme. The main advantage of elliptic curves systems is thus their high cryptographic strength relative to the size of t...

Full description

Bibliographic Details
Main Author: Ali M. Sagheer
Format: Article
Language:English
Published: University of Anbar 2008-04-01
Series:مجلة جامعة الانبار للعلوم الصرفة
Subjects:
Online Access:https://juaps.uoanbar.edu.iq/article_15446_215f3095a8650320aa127e5f02c96423.pdf