Elliptic-Curve Factorization and Witnesses

被引:0
|
作者
Pomykala, Jacek [1 ]
Zolnierczyk, Olgierd [1 ]
机构
[1] Mil Univ Technol, Fac Cybernet, Warsaw, Poland
来源
关键词
EC factorization; B-smooth numbers; Factor bases;
D O I
10.1007/978-3-031-63749-0_20
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We define the EC (Elliptic Curve)-based factorization witnesses and prove related results within both conditional and unconditional approaches. We present experimental computations that support the conjecture of behavior of related admissible elliptic curves in relation to the deterministic complexity of suitable factoring algorithms based on the parameters of the witnesses. This paper features three main results devoted to the factorization of RSA numbers N = pq, where q > p. The first result of computational complexity of elliptic curve factorization is improved by the factor D-sigma, comparing to previously known result O(D2+o(1)), where D is smoothness bound, assuming additional knowledge of the admissible elliptic curve. The second result demonstrates the feasibility of achieving factorization in deterministic, polynomial time, based on knowledge obtained at a specific step in the elliptic curve method (ECM), a feat previously considered impossible. The third result establishes deterministic time for conditional factorization using the elliptic version of Fermat method. It has the magnitude order (logN)(O(1)) (1+(|a(p) |+| a(q)|/D)(2)), provided q/p << 1. Here a(p), a(q) are the Frobenius traces of the corresponding curves (E(F-p), E(F-q)), and D indicates the approximation of the quotient p/q by the quotient a(p)/a(q), assuming that the order of the group of points over a pseudo elliptic curve E(Z(N)) is known.
引用
收藏
页码:287 / 301
页数:15
相关论文
共 50 条
  • [1] Elliptic-curve cryptography
    Fernandes, AD
    [J]. DR DOBBS JOURNAL, 1999, 24 (12): : 56 - +
  • [2] Secure Delegation of Elliptic-Curve Pairing
    Chevallier-Mames, Benoit
    Coron, Jean-Sebastien
    McCullagh, Noel
    Naccache, David
    Scott, Michael
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATION, PROCEEDINGS, 2010, 6035 : 24 - +
  • [3] Secure and Efficient Delegation of Elliptic-Curve Pairing
    Di Crescenzo, Giovanni
    Khodjaeva, Matluba
    Kahrobaei, Delaram
    Shpilrain, Vladimir
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 45 - 66
  • [4] Delegating Elliptic-Curve Operations with Homomorphic Encryption
    Aguilar-Melchor, Carlos
    Deneuville, Jean-Christophe
    Gaborit, Philippe
    Lepoint, Tancrede
    Ricosset, Thomas
    [J]. 2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [5] Elliptic-Curve Crypto Processor for RFID Applications
    Rashid, Muhammad
    Jamal, Sajjad Shaukat
    Khan, Sikandar Zulqarnain
    Alharbi, Adel R.
    Aljaedi, Amer
    Imran, Malik
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (15):
  • [6] Fast Elliptic-Curve Cryptography on the Cell Broadband Engine
    Costigan, Neil
    Schwabe, Peter
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 368 - +
  • [7] Implementation of elliptic-curve cryptography on mobile healthcare devices
    Malhotra, K.
    Gardner, S.
    Patz, R.
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING, AND CONTROL, VOLS 1 AND 2, 2007, : 239 - 244
  • [8] FPGA Implementation of Elliptic-Curve Diffie Hellman Protocol
    Khan, Sikandar Zulqarnain
    Jamal, Sajjad Shaukat
    Sajid, Asher
    Rashid, Muhammad
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 1879 - 1894
  • [9] Analysis and optimization of elliptic-curve single-scalar multiplication
    Bernstein, Daniel J.
    Lange, Tanja
    [J]. FINITE FIELDS AND APPLICATIONS, 2008, 461 : 1 - +
  • [10] Elliptic-curve scalar multiplication algorithm using ZOT structure
    Almimi, Hani
    Samsudin, Azman
    Jahani, Shahram
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1141 - 1154