À propos de cet article
Publié en ligne: 16 août 2023
Pages: 1 - 11
DOI: https://doi.org/10.2478/ijanmc-2023-0051
Mots clés
© 2023 Yanxun Chen et al., published by Sciendo
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Figure 1.

Figure 2.

Figure 3.

Figure 4.

Figure 5.

Figure 6.

ECC key generation process and transparency characteristics table
Initial private key | k | Only visible to yourself |
Initial public key | K=kG | Visible to all |
Derived Private Keys | Kt=k*HASH(x||t)mod n | Only visible to yourself |
Derived Public Key | Kt=K*HASH(x||t)=ktG | Both sides of the communication are visible |
Session Key | Kst=KAKBt=kBKAt | Both sides of the communication are visible |