Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining

Mathematical models based on elliptic curves have been intensively studied since their applicability in data security systems was discovered. In this article, the authors describe the optimal way to select particular subspaces over which elliptic curves are defined, showing the applicability of thes...

Full description

Bibliographic Details
Main Authors: Daniel Ioan Hunyadi, Oana-Adriana Ticleanu, Nicolae Constantinescu
Format: Article
Language:English
Published: MDPI AG 2022-12-01
Series:Mathematics
Subjects:
Online Access:https://www.mdpi.com/2227-7390/11/1/122
_version_ 1797406798126252032
author Daniel Ioan Hunyadi
Oana-Adriana Ticleanu
Nicolae Constantinescu
author_facet Daniel Ioan Hunyadi
Oana-Adriana Ticleanu
Nicolae Constantinescu
author_sort Daniel Ioan Hunyadi
collection DOAJ
description Mathematical models based on elliptic curves have been intensively studied since their applicability in data security systems was discovered. In this article, the authors describe the optimal way to select particular subspaces over which elliptic curves are defined, showing the applicability of these subspaces in secure data transfer. Access to large databases and analyses of the requests made to these databases are required daily by a variety of users, including legal entities. An attack on these communication systems causes violations in privacy and damage to/theft of data that can be worth EUR tens of billions annually. For requests made between computers, encryption methods can be used as these systems have adequate computing power and energy. For requests made from fixed and mobile systems, if the data are distributed heterogeneously, the computing power required to authenticate both the users and the answering entities determines the efficiency of the proposed solution. To address this limitation, our study proposes a double-authentication method based on particular elliptic-curve systems.
first_indexed 2024-03-09T03:31:49Z
format Article
id doaj.art-c5992dc844374119b7aae9bd536de05c
institution Directory Open Access Journal
issn 2227-7390
language English
last_indexed 2024-03-09T03:31:49Z
publishDate 2022-12-01
publisher MDPI AG
record_format Article
series Mathematics
spelling doaj.art-c5992dc844374119b7aae9bd536de05c2023-12-03T14:54:44ZengMDPI AGMathematics2227-73902022-12-0111112210.3390/math11010122Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data MiningDaniel Ioan Hunyadi0Oana-Adriana Ticleanu1Nicolae Constantinescu2Faculty of Science, Department of Mathematics and Informatics, Lucian Blaga University of Sibiu, 550012 Sibiu, RomaniaFaculty of Science, Department of Mathematics and Informatics, Lucian Blaga University of Sibiu, 550012 Sibiu, RomaniaFaculty of Science, Department of Mathematics and Informatics, Lucian Blaga University of Sibiu, 550012 Sibiu, RomaniaMathematical models based on elliptic curves have been intensively studied since their applicability in data security systems was discovered. In this article, the authors describe the optimal way to select particular subspaces over which elliptic curves are defined, showing the applicability of these subspaces in secure data transfer. Access to large databases and analyses of the requests made to these databases are required daily by a variety of users, including legal entities. An attack on these communication systems causes violations in privacy and damage to/theft of data that can be worth EUR tens of billions annually. For requests made between computers, encryption methods can be used as these systems have adequate computing power and energy. For requests made from fixed and mobile systems, if the data are distributed heterogeneously, the computing power required to authenticate both the users and the answering entities determines the efficiency of the proposed solution. To address this limitation, our study proposes a double-authentication method based on particular elliptic-curve systems.https://www.mdpi.com/2227-7390/11/1/122elliptic-curve cryptographydouble authenticationdata mining
spellingShingle Daniel Ioan Hunyadi
Oana-Adriana Ticleanu
Nicolae Constantinescu
Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining
Mathematics
elliptic-curve cryptography
double authentication
data mining
title Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining
title_full Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining
title_fullStr Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining
title_full_unstemmed Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining
title_short Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining
title_sort optimal elliptic curve subspaces for applications in double authenticated requests in mobile distributed data mining
topic elliptic-curve cryptography
double authentication
data mining
url https://www.mdpi.com/2227-7390/11/1/122
work_keys_str_mv AT danielioanhunyadi optimalellipticcurvesubspacesforapplicationsindoubleauthenticatedrequestsinmobiledistributeddatamining
AT oanaadrianaticleanu optimalellipticcurvesubspacesforapplicationsindoubleauthenticatedrequestsinmobiledistributeddatamining
AT nicolaeconstantinescu optimalellipticcurvesubspacesforapplicationsindoubleauthenticatedrequestsinmobiledistributeddatamining