Abstract:
The present disclosure relates to a method and device for performing an elliptic curve cryptography computation comprising: twisting, by a first device based on a first index of quadratic or higher order twist (d), a first point (P′KB) on a first elliptic curve over a further elliptic curve twisted with respect to the first elliptic curve to generate a twisted key (PKB); transmitting the twisted key (PKB) to a further device; receiving, from the further device, a return value (ShS) generated based on the twisted key (PKB); and twisting, by the first device based on the first index of quadratic or higher order twist (d), the return value (ShS) over the first elliptic curve to generate a result (ShS′) of the ECC computation.
Abstract:
An access process for an electronic device includes storing encrypted partitions in a storage area of the electronic device, with each encrypted partition corresponding to a registered user. A secure element is received from a registered user, with the secure element storing a user key for decrypting an encrypted partition corresponding to the register user providing the user key. A temporary secure channel is established between the secure element and the electronic device, and a registered user associated to one of the encrypted partitions is authenticated in the electronic device. An identification of the registered user authenticated in the electronic device is transmitted to the secure device, and the user key of the authenticated registered user is transmitted from the secure element to the electronic device over the temporary secure channel.