Software Implementation of a Pairing Function for Public Key Cryptosystems

被引:0
|
作者
Kanbara, Yusuke [1 ]
Teruya, Tadanori [2 ]
Kanayama, Naoki [1 ]
Nishide, Takashi [1 ]
Okamoto, Eiji [1 ]
机构
[1] Univ Tsukuba, 1-1-1 Ten Nodai, Tsukuba, Ibaraki 3058573, Japan
[2] Natl Inst Adv Ind Sci & Technol, Koto Ku, Tokyo 1350064, Japan
关键词
Pairing Library; Barreto-Naehrig elliptic curve;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There are various protocols using pairing operations such as ID-Based Encryption and Functional Encryption in recent years. These protocols could not be realized by using conventional public key encryption. Hence, pairing plays an important role in modern society. However, implementing an efficient pairing library needs a deep knowledge of mathematics and is a not-trivial task. In order to solve this problem, we released Pairing Library called TEPLA ( University of Tsukuba Elliptic Curve and Pairing Library). This library can compute pairings, finite field arithmetic and elliptic curve operations. TEPLA is implemented by using Beuchat et al.'s algorithm in PAIRING2010. After a year Aranha et al. proposed a new method of compute pairings. The method of Arahna et al. computes a pairing faster than Beuchat et al.' s algorithm by about 28%-34%. In this work, we actually implement a pairing library with reference by using Aranha et al.' s algorithm in EUROCRYPT2011 to demonstrate the speed of Aranha el al. and offer the pairing library as an open source software.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Analysis of two knapsack public key cryptosystems
    Peng, Liqiang
    Hu, Lei
    Xu, Jun
    Xie, Yonghong
    Zuo, Jinyin
    [J]. IET COMMUNICATIONS, 2013, 7 (15) : 1638 - 1643
  • [42] Generalised Asynchronous Remote Key Generation for Pairing-Based Cryptosystems
    Frymann, Nick
    Gardham, Daniel
    Manulis, Mark
    Nartz, Hugo
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT I, ACNS 2023, 2023, 13905 : 394 - 421
  • [43] On the practical performance of hyperelliptic curve cryptosystems in software implementation
    Sakai, Y
    Sakurai, K
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (04) : 692 - 703
  • [44] FPGA based unified architecture for public key and private key cryptosystems
    Wang, Yi
    Li, Renfa
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2013, 7 (03) : 307 - 316
  • [45] Public Key Cryptosystems Based on Drinfeld Modules Are Insecure
    Thomas Scanlon
    [J]. Journal of Cryptology, 2001, 14 : 225 - 230
  • [46] FPGA based unified architecture for public key and private key cryptosystems
    Yi Wang
    Renfa Li
    [J]. Frontiers of Computer Science, 2013, 7 : 307 - 316
  • [47] General Fault Attacks on Multivariate Public Key Cryptosystems
    Hashimoto, Yasufumi
    Takagi, Tsuyoshi
    Sakurai, Kouichi
    [J]. POST-QUANTUM CRYPTOGRAPHY, 2011, 7071 : 1 - +
  • [48] Secure evolutionary hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LM
    [J]. CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 2130 - 2137
  • [49] Digital signatures and public key cryptosystems with multilayer perceptrons
    Yee, LP
    De Silva, LC
    [J]. ICONIP'02: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON NEURAL INFORMATION PROCESSING: COMPUTATIONAL INTELLIGENCE FOR THE E-AGE, 2002, : 2308 - 2311
  • [50] Elliptic curve public-key cryptosystems - An introduction
    De Win, E
    Preneel, B
    [J]. STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 131 - 141