Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures

被引:0
|
作者
Wang, Maocai [1 ,2 ]
Dai, Guangming [1 ,2 ]
Choo, Kim-Kwang Raymond [1 ,2 ,3 ]
Jayaraman, Prem Prakash [4 ]
Ranjan, Rajiv [5 ]
机构
[1] China Univ Geosci, Sch Comp, Wuhan, Hubei, Peoples R China
[2] China Univ Geosci, Hubei Key Lab Intelligent Geoinformat Proc, Wuhan, Hubei, Peoples R China
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX USA
[4] RMIT Univ, Melbourne, Vic, Australia
[5] Newcastle Univ, Newcastle Upon Tyne, Tyne & Wear, England
来源
PLOS ONE | 2016年 / 11卷 / 08期
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
G-HADOOP; CYBERINFRASTRUCTURE;
D O I
10.1371/journal.pone.0161857
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user's public key based on the user's identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Faster Beta Weil Pairing on BLS Pairing Friendly Curves with Odd Embedding Degree
    Laurian, Azebaze Guimagang
    Emmanuel, Fouotsa
    Nadia, El Mrabet
    Aminatou, Pecha Njiahouo
    MATHEMATICS IN COMPUTER SCIENCE, 2022, 16 (02)
  • [42] Computing the ate pairing on elliptic curves with embedding degree k=9
    Lin, Xibin
    Zhao, Chang-An
    Zhang, Fangguo
    Wang, Yanming
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (09) : 2387 - 2393
  • [43] Faster optimal ate pairings for cyclotomic sparse families of pairing-friendly elliptic curves with embedding degrees k = 5,7
    Nyamsi, Senegue Gomez
    Fouotsa, Emmanuel
    Tcheka, Calvin
    DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, 2024, 16 (05)
  • [44] A new method of choosing primitive elements for Brezing-Weng families of pairing-friendly elliptic curves
    Yoon, Kisoon
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (01) : 1 - 9
  • [45] On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One
    Chatterjee, Sanjit
    Menezes, Alfred
    Rodriguez-Henriquez, Francisco
    IEEE TRANSACTIONS ON COMPUTERS, 2017, 66 (06) : 1061 - 1070
  • [46] Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree
    Ionica, Sorina
    Joux, Antoine
    PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 435 - 449
  • [47] Efficient Non Symmetric Pairing Groups on Ordinary Pairing Friendly Curve of Embedding Degree 1
    Izuta, Tetsuya
    Nogami, Yasuyuki
    Morikawa, Yoshitaka
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [48] Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and Its Applications to Pairing-Based Cryptography
    Li, Liang
    Hu, Gengran
    EMERGING INFORMATION SECURITY AND APPLICATIONS, EISA 2023, 2024, 2004 : 77 - 91
  • [49] Fast subgroup membership testings for G1, G2 and GT on pairing-friendly curves
    Dai, Yu
    Lin, Kaizhan
    Zhao, Chang-An
    Zhou, Zijian
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (10) : 3141 - 3166
  • [50] Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016
    Teruya, Tadanori
    PLOS ONE, 2019, 14 (02):