The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A survey of homomorphic encryption for nonspecialists
EURASIP Journal on Information Security
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
A Homomorphic Method for Sharing Secret Images
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Secure distortion computation among untrusting parties using homomorphic encryption
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks
SENSORCOMM '10 Proceedings of the 2010 Fourth International Conference on Sensor Technologies and Applications
Efficient multiplicative homomorphic e-voting
ISC'10 Proceedings of the 13th international conference on Information security
Secure network coding over the integers
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
Fingerprinting protocol for images based on additive homomorphic property
IEEE Transactions on Image Processing
Image encryption using a new parametric switching chaotic system
Signal Processing
A new 1D chaotic system for image encryption
Signal Processing
Hi-index | 0.08 |
This paper proposes an encryption scheme with a new additive homomorphism based on Elliptic Curve ElGamal (EC-ElGamal) for sharing secret images over unsecured channel. The proposed scheme enables shorter key and better performance than schemes based on RSA or ElGamal. It has a lower computation overhead in image decryption comparing with the method that uses other additively homomorphic property in EC-ElGamal. Elliptic curve parameters are selected to resist the Pohlig-Hellman, Pollard's-rho, and Isomorphism attacks. Experimental results and analysis show that the proposed method has superior performance to RSA and ElGamal.