Software Implementation of a Pairing Function for Public Key Cryptosystems

被引:0
|
作者
Kanbara, Yusuke [1 ]
Teruya, Tadanori [2 ]
Kanayama, Naoki [1 ]
Nishide, Takashi [1 ]
Okamoto, Eiji [1 ]
机构
[1] Univ Tsukuba, 1-1-1 Ten Nodai, Tsukuba, Ibaraki 3058573, Japan
[2] Natl Inst Adv Ind Sci & Technol, Koto Ku, Tokyo 1350064, Japan
关键词
Pairing Library; Barreto-Naehrig elliptic curve;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There are various protocols using pairing operations such as ID-Based Encryption and Functional Encryption in recent years. These protocols could not be realized by using conventional public key encryption. Hence, pairing plays an important role in modern society. However, implementing an efficient pairing library needs a deep knowledge of mathematics and is a not-trivial task. In order to solve this problem, we released Pairing Library called TEPLA ( University of Tsukuba Elliptic Curve and Pairing Library). This library can compute pairings, finite field arithmetic and elliptic curve operations. TEPLA is implemented by using Beuchat et al.'s algorithm in PAIRING2010. After a year Aranha et al. proposed a new method of compute pairings. The method of Arahna et al. computes a pairing faster than Beuchat et al.' s algorithm by about 28%-34%. In this work, we actually implement a pairing library with reference by using Aranha et al.' s algorithm in EUROCRYPT2011 to demonstrate the speed of Aranha el al. and offer the pairing library as an open source software.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Implementation of Cryptosystems Based on Tate Pairing
    Lei Hu
    Jun-Wu Dong
    Ding-Yi Pei
    [J]. Journal of Computer Science and Technology, 2005, 20 : 264 - 269
  • [2] Implementation of cryptosystems based on tate pairing
    Hu, L
    Dong, JW
    Pei, DY
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2005, 20 (02) : 264 - 269
  • [3] Parallel Implementation of Public Key Cryptosystems using Web Workers
    Sumi, Takuya
    Ishiguro, Tsukasa
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    Kobayashi, Toru
    Takagi, Tsuyoshi
    [J]. 2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,
  • [4] PUBLIC KEY CRYPTOSYSTEMS
    ELKATEEB, A
    ALKHAYATT, S
    [J]. INFORMATION AGE, 1983, 5 (04): : 232 - 237
  • [5] Extended multivariate public key cryptosystems with secure encryption function
    WANG HouZhen 1
    2 State Key Laboratory of Software Engineering
    [J]. Science China(Information Sciences), 2011, 54 (06) : 1161 - 1171
  • [6] Extended multivariate public key cryptosystems with secure encryption function
    HouZhen Wang
    HuanGuo Zhang
    ZhangYi Wang
    Ming Tang
    [J]. Science China Information Sciences, 2011, 54
  • [7] Efficient implementation of public key cryptosystems on mote sensors (short paper)
    Wang, Haodong
    Li, Qun
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 519 - +
  • [8] On the implementation of public key cryptosystems against fault-based attacks
    Laih, CS
    Tu, FK
    Lee, YC
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (06) : 1082 - 1089
  • [9] Efficient Implementation of Pairing-Based Cryptosystems
    Paulo S. L. M. Barreto
    Ben Lynn
    Michael Scott
    [J]. Journal of Cryptology, 2004, 17 : 321 - 334
  • [10] Extended multivariate public key cryptosystems with secure encryption function
    Wang HouZhen
    Zhang HuanGuo
    Wang ZhangYi
    Tang Ming
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (06) : 1161 - 1171