New computation paradigm for modular exponentiation using a graph model

被引:0
|
作者
Park, CS [1 ]
Lee, MK
Kim, DK
机构
[1] Pusan Natl Univ, Pusan 609735, South Korea
[2] Inha Univ, Inchon 402751, South Korea
关键词
exponentiation; modular exponentiation; graph model; window method;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modular exponentiation is to compute x(E) mod N for positive integers x, E, and N. It is an essential operation for various public-key cryptographic algorithms such as RSA, ElGamal and DSA, and it is crucial to develop fast modular exponentiation methods for efficient implementation of the above algorithms. To accelerate modular exponentiation, one can either speed up each multiplication or reduce the number of required multiplications. We focus on the latter. In this paper, we propose a general model to describe the behavior of modular exponentiation in terms of a graph. First, we show that the problem of finding the minimum number of multiplications for a modular exponentiation is equivalent to finding a shortest path in its corresponding graph. The previously known exponentiation algorithms including the binary method, the M-ary method and the sliding window method can be represented as a specific instance of our model. Next, we present a general method to reduce the number of required multiplications by modifying the pre-computation table which is used for the sliding window method. According to our experimental results, the new method significantly reduces the number of multiplications, especially in the cases that the exponent E has a high Hamming weight.
引用
收藏
页码:170 / 179
页数:10
相关论文
共 50 条
  • [1] THE RUNTIME ANALYSIS OF COMPUTATION OF MODULAR EXPONENTIATION
    Prots'ko, I
    Kryvinska, N.
    Gryshchuk, O.
    RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2021, (03) : 42 - 47
  • [2] New modular multiplication algorithms for fast modular exponentiation
    Hong, SM
    Oh, SY
    Yoon, H
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 166 - 177
  • [3] Verifiable outsourcing computation for modular exponentiation from shareable functions
    Liu M.
    Wu Y.
    Xue R.
    Zhang R.
    Liu, Muhua (lxk0379@126.com), 1600, Springer (23): : 43 - 55
  • [4] Modular exponentiation using parallel multipliers
    Tang, SH
    Tsui, KS
    Leong, PHW
    2003 IEEE INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT), PROCEEDINGS, 2003, : 52 - 59
  • [5] FAST SERVER-AIDED SECRET COMPUTATION PROTOCOLS FOR MODULAR EXPONENTIATION
    KAWAMURA, S
    SHIMBO, A
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) : 778 - 784
  • [6] MODULAR EXPONENTIATION USING RECURSIVE SUMS OF RESIDUES
    FINDLAY, PA
    JOHNSON, BA
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 371 - 386
  • [7] Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing
    Ohara, Kazuma
    Watanabe, Yohei
    Iwamoto, Mitsugu
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (09) : 1079 - 1090
  • [8] A New Algorithm for Secure Outsourcing Composite Modular Exponentiation
    Liu, Jie
    Yang, Bo
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING ICISCE 2015, 2015, : 461 - 465
  • [9] 2 ALGORITHMS FOR MODULAR EXPONENTIATION USING NONSTANDARD ARITHMETICS
    DIMITROV, V
    COOKLEV, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1995, E78A (01) : 82 - 87
  • [10] Modular Multiplication and Exponentiation Architectures for Fast RSA Cryptosystem Based on Digit Serial Computation
    Sutter, Gustavo D.
    Deschamps, Jean-Pierre
    Luis Imana, Jose
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2011, 58 (07) : 3101 - 3109