Faster pairings using an elliptic curve with an efficient endomorphism

被引:0
|
作者
Scott, M [1 ]
机构
[1] Dublin City Univ, Sch Comp, Dublin 9, Ireland
关键词
tate pairing implementation; pairing-based cryptosystems;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The most significant pairing-based cryptographic protocol to be proposed so far is undoubtedly the Identity-Based Encryption (IBE) protocol of Boneh and Franklin. In their paper [6] they give details of how their scheme might be implemented in practice on certain supersingular elliptic curves of prime characteristic. They also point out that the scheme could as easily be implemented on certain special nonsupersingular curves for the same level of security. An obvious question to be answered is - which is most efficient? Motivated by the work of Gallant, Lambert and Vanstone [14] we demonstrate that, perhaps counter to intuition, certain ordinary curves closely related to the supersingular curves originally recommended by Boneh and Franklin, provide better performance. We illustrate our technique by implementing the fastest pairing algorithm to date (on elliptic curves over fields of prime characteristic) for contemporary levels of security, albeit on a rather particular class of curves. We also point out that many of the non-supersingular families of curves recently discovered and proposed for use in pairing-based cryptography can also benefit (to an extent) from the same technique.
引用
收藏
页码:258 / 269
页数:12
相关论文
共 50 条
  • [1] Efficient Pairings on Twisted Elliptic Curve
    Nogami, Yasuyuki
    Akane, Masataka
    Sakemi, Yumi
    Morikawa, Yoshitaka
    [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 430 - +
  • [2] Elliptic Curve Pairings
    Fitzgerald, Joshua Brian
    [J]. COMPUTER, 2022, 55 (04) : 74 - 77
  • [3] On the elliptic curve endomorphism generator
    Merai, Laszlo
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (05) : 1113 - 1129
  • [4] On the elliptic curve endomorphism generator
    László Mérai
    [J]. Designs, Codes and Cryptography, 2018, 86 : 1113 - 1129
  • [5] LIFTING AN ENDOMORPHISM OF AN ELLIPTIC CURVE TO CHARACTERISTIC ZERO
    OORT, F
    [J]. PROCEEDINGS OF THE KONINKLIJKE NEDERLANDSE AKADEMIE VAN WETENSCHAPPEN SERIES A-MATHEMATICAL SCIENCES, 1973, 76 (05): : 466 - 470
  • [6] Trace of Frobenius endomorphism of an elliptic curve with complex multiplication
    Ishii, N
    [J]. BULLETIN OF THE AUSTRALIAN MATHEMATICAL SOCIETY, 2004, 70 (01) : 125 - 142
  • [7] Faster attacks on elliptic curve cryptosystems
    Wiener, MJ
    Zuccherato, RJ
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 190 - 200
  • [8] Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings
    Islam, S. K. Hafizul
    Biswas, G. P.
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2014, 26 (01) : 89 - 97
  • [9] Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings
    Xu, Xiu
    Leonardi, Chris
    Teh, Anzo
    Jao, David
    Wang, Kunpeng
    Yu, Wei
    Azarderakhsh, Reza
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 293 - 309
  • [10] Efficient elliptic curve exponentiation using mixed coordinates
    Cohen, H
    Miyaji, A
    Ono, T
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT'98, 1998, 1514 : 51 - 65