Security: We give a list of criteria that should be satisfied by a secure elliptic curve. Although a few of these criteria are incompatible, we detail what we think are the best choices for optimal security.
Transparency: We sketch a way to generate a curve in a fully transparent way so that it can be trusted and not suspected to belong to a (not publicly known to be) vulnerable class. In particular, since the computational cost of verifying the output of such a process may be quite high, we sketch out the format of a certificate that eases the computations. We think that this format might deserve being standardized.Category / Keywords: public-key cryptography / elliptic curve cryptosystem Original Publication (in the same form): NIST ECC Workshop 2015 Date: received 1 Jul 2015 Contact author: jean-pierre flori at ssi gouv fr Available format(s): PDF | BibTeX Citation Version: 20150702:080428 (All versions of this report) Short URL: ia.cr/2015/659 Discussion forum: Show discussion | Start new discussion