Characterization of a cubic interpolation scheme dependent on two parameters and applications

Dana Simian, Oana Adriana Ticleanu, Nicolae Constantinescu

Abstract


The aim of this paper is to provide a characterization diagram for a family of B\'{e}zier flexible interpolation curves as well as to present an application of our results in cryptography. In our interpolation scheme, two parameters, $t_1,\ t_2\in (0,1)$ determine the position of the interpolation points on the B\'{e}zier curve. Consequently we obtain a family of B\'{e}zier interpolation curves depending on two parameters.
Altering the values of the parameters we modify the intermediary control points and implicitly the shape of the interpolation curve.
In order to control the shape of the interpolation curves from this family, we provide a partition of the domain $T=(0,1)\times (0,1)$ where the parameters lie according to the geometric characterization of these curves: with zero, one or two inflexion points; with loop; with cusp and degenerated in quadratic curves. The characterization diagram can be used as a tool for the choice of parameters, with possible applications in different fields. We present one of its application in cryptography, for finding certain subspaces over which particular elliptic sub-curves are defined. Computation, implementation and graphics are made using MATLAB.


Full Text:

PDF

References


K. Adesh, M. Yahya, V. Kumar and V. Khan, A secure user authentication protocol using elliptic curve cryptography. Journal of discrete mathematical sciences & Cryptography 22 (2019), no. 4, 521–530. DOI: 10.1080/09720529.2019.1637155

U. Bashir, M. Abbas, and J.M. Ali, The G2 and C2 rational quadratic trigonometric Bézier curve with two shape parameters with applications, Applied Mathematics and Computation 219 (2013), no. 20, 10183–10197. DOI: 10.1016/j.amc.2013.03.110

N. Constantinescu, Non supersingular elliptic curves – From theory to application. Algorithm attacks discussions, Mathematica 50 (2008), no. 2, 177–186.

G. Farin, Curves and surfaces for computer aided geometric design. A practical guide, Academic Press, Boston, 1996.

A. R. Forrest, The twisted cubic curve: A computer-aided geometric design approach, Computer Aided Design 12 (1980), no. 4, 165–172. DOI: 10.1016/0010-4485(80)90149-9

X.A. Han, X. Huang, and Y. Ma, Shape analysis of cubic trigonometric Bézier curves with a shape parameter, Applied Mathematics and Computation 217 (2010), no. 6, 2527–2533. DOI: 10.1016/j.amc.2010.07.065

X.A. Han, Y. Ma, and X. Huang, The cubic trigonometric Bézier curve with two shape parameters, Applied Mathematics Letters 22 (2009), no. 2, 226–231. DOI: 10.1016/j.aml.2008.03.015

A. Karrar, R. Taher and R. Ajeena, The elliptic scalar multiplication graph and its application in elliptic curve cryptography. Journal of discrete mathematical sciences & Cryptography 24 (2021), no. 6, 1793–1807. DOI: 10.1080/09720529.2021.1932896

P. Koprowski, Algebraic approach to geometric characterization of parametric cubics, J. for Geometry and Graphics 11 (2007), no. 2, 173–178.

X. Qin, G. Hu, N. Zhang, X. Shen, and Y. Yang, A novel extension to the polynomial basis functions describing Bézier curves and surfaces of degree n with multiple shape parameters, Applied Mathematics and Computation 223 (2013), 1–16. DOI: 10.1016/j.amc.2013.07.073

J. Sachez-Reyes, Harmonic rational Bézier curves, p- Bézier curves and trigonometric polynomials, Computed Aided Geometric Design 15 (1998), no. 9, 909–923. DOI: 10.1016/S0167- 8396(98)00031-4

M. C. Stone, X. Parc and T. D. Derose, A geometric characterization of parametric cubic curves, ACM Transactions on Graphics 8 (1989), no. 3, 147–163. DOI: 10.1145/77055.77056

B. Su and D. Liu, An affine invariant and its application in computational geometry, Scientia Sinica, Series A 26 (1983), no. 3, 259–272.

C. Y. Wang, Shape classification of the parametric cubic curve and parametric b-spline cubic curve, Comput. Aided Des. 13 (1981), no. 4, 199–206. DOI: 10.1016/0010-4485(81)90141-X

W.-T. Wang and G.-Z. Wang, Bézier curves with shape parameter, Journal of Zhejiang University: Science A 6 (2005), no. 6, 497–501. DOI: 10.1007/BF02841755

B. Mazur and K. Rubin, Organizing the arithmetic of elliptic curves, Advances in Mathematics 198 (2005), 504–546. DOI: 10.1016/j.aim.2005.05.024

A. Sachdeva, A Study of Encryption Algorithms AES, DES and RSA for Security, Network Web and Security 13 (2013), no. 15, 1–9.

D. Simian and C. Simian, On an approach for cubic Bézier interpolation, Modelling and Development of Intelligent Systems, Proceedings of the 2nd Int. Conf., Sibiu, Romania, (2011), 152–159.

G. Stephanides and N. Constantinescu, The GN-authenticated key agreement, Applied Mathematics and Computation, Elsevier 170 (2005), 531–544. DOI: 10.1016/j.amc.2004.12.013

C. Xavier and L. Reynald, Fast computation of elliptic curve isogenies in characteristic two. Journal of the London mathematical society – second series 104 (2021), no. 4, 1901–1929. DOI: 10.48550/arXiv.2003.06367




DOI: https://doi.org/10.52846/ami.v49i2.1703