Hardware and software normal basis arithmetic for pairing-based cryptography in characteristic three

被引:33
|
作者
Granger, R [1 ]
Page, D [1 ]
Stam, M [1 ]
机构
[1] Univ Bristol, Dept Comp Sci, Bristol BS8 1UB, Avon, England
关键词
public key cryptosystems; computer arithmetic; high-speed arithmetic;
D O I
10.1109/TC.2005.120
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Although identity-based cryptography offers a number of functional advantages over conventional public key methods, the computational costs are significantly greater. The dominant part of this cost is the Tate pairing, which, in characteristic three, is best computed using the algorithm of Duursma and Lee. However, in hardware and constrained environments, this algorithm is unattractive since it requires online computation of cube roots or enough storage space to precompute required results. We examine the use of normal basis arithmetic in characteristic three in an attempt to get the best of both worlds: an efficient method for computing the Tate pairing that requires no precomputation and that may also be implemented in hardware to accelerate devices such as smart-cards.
引用
收藏
页码:852 / 860
页数:9
相关论文
共 50 条
  • [1] Arithmetic operators for pairing-based cryptography
    Beuchat, Jean-Luc
    Brisebarre, Nicolas
    Detrey, Jeremie
    Okamoto, Eiji
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2007, PROCEEDINGS, 2007, 4727 : 239 - +
  • [2] Pairing-based cryptography for homomorphic cryptography
    Nogami, Yasuyuki
    Miyoshi, Shunsuke
    2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 318 - 321
  • [3] Report on Pairing-based Cryptography
    Moody, Dustin
    Peralta, Rene
    Perlner, Ray
    Regenscheid, Andrew
    Roginsky, Allen
    Chen, Lily
    JOURNAL OF RESEARCH OF THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, 2015, 120 : 11 - 27
  • [4] An Introduction to Pairing-Based Cryptography
    Menezes, Alfred
    RECENT TRENDS IN CRYPTOGRAPHY, 2009, 477 : 47 - 65
  • [5] Usability of Pairing-Based Cryptography on Smartphones
    Malina, Lukas
    Hajny, Jan
    Zeman, Vaclav
    2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 617 - 621
  • [6] Subgroup Security in Pairing-Based Cryptography
    Barreto, Paulo S. L. M.
    Costello, Craig
    Misoczki, Rafael
    Naehrig, Michael
    Pereira, Geovandro C. C. F.
    Zanon, Gustavo
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 245 - 265
  • [7] Tampering attacks in pairing-based cryptography
    Bloemer, Johannes
    Guenther, Peter
    Liske, Gennadij
    2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014), 2014, : 1 - 7
  • [8] A fault attack on pairing-based cryptography
    Page, Daniel
    Vercauteren, Frederik
    IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (09) : 1075 - 1080
  • [9] Automated Proofs of Pairing-Based Cryptography
    Barthe, Gilles
    Gregoire, Benjamin
    Schmidt, Benedikt
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1156 - 1168
  • [10] Pairing-Based Cryptography on Elliptic Curves
    Miret, Josep M.
    Sadornil, Daniel
    Tena, Juan G.
    MATHEMATICS IN COMPUTER SCIENCE, 2018, 12 (03) : 309 - 318