On the use of weber polynomials in elliptic curve cryptography

被引:0
|
作者
Konstantinou, E
Stamatiou, YC
Zaroliagis, C
机构
[1] Inst Comp Technol, Patras 26110, Greece
[2] Univ Patras, Dept Comp Eng & Informat, Patras 26500, Greece
[3] Univ Aegean, Dept Math, Samos 83200, Greece
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In many cryptographic applications it is necessary to generate elliptic curves (ECs) with certain security properties. These curves are commonly constructed using the Complex Multiplication method which typically uses the roots of Hilbert or Weber polynomials. The former generate the EC directly, but have high computational demands, while the latter are faster to construct but they do not lead, directly, to the desired EC. In this paper we present in a simple and unifying manner a complete set of transformations of the roots of a Weber polynomial to the roots of its corresponding Hilbert polynomial for all discriminant values on which they are defined. Moreover, we prove a theoretical estimate of the precision required for the computation of Weber polynomials. Finally, we experimentally assess the computational efficiency of the Weber polynomials along with their precision requirements for various discriminant values and compare the results with the theoretical estimates. Our experimental results may be used as a guide for the selection of the most efficient curves in applications residing in resource limited devices such as smart cards that support secure and efficient Public Key Infrastructure (PKI) services.
引用
收藏
页码:335 / 349
页数:15
相关论文
共 50 条
  • [1] CREATING AN ELLIPTIC CURVE ARITHMETIC UNIT FOR USE IN ELLIPTIC CURVE CRYPTOGRAPHY
    Fournaris, Apostolos P.
    Koufopavlou, Odysseas
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, PROCEEDINGS, 2008, : 1457 - 1464
  • [2] Use of elliptic curve cryptography for multimedia encryption
    Tawalbeh, Lo'ai
    Mowafi, Moad
    Aljoby, Walid
    [J]. IET INFORMATION SECURITY, 2013, 7 (02) : 67 - 74
  • [3] Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography
    M. Barbosa
    A. Moss
    D. Page
    [J]. Journal of Cryptology, 2009, 22 : 259 - 281
  • [4] Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography
    Barbosa, M.
    Moss, A.
    Page, D.
    [J]. JOURNAL OF CRYPTOLOGY, 2009, 22 (02) : 259 - 281
  • [5] Elliptic Curve Cryptography on PocketPCs
    Edoh, Kossi
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (03): : 23 - 33
  • [6] The state of elliptic curve cryptography
    Koblitz, N
    Menezes, A
    Vanstone, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 173 - 193
  • [7] Elliptic Curve Cryptography in Practice
    Bos, Joppe W.
    Halderman, J. Alex
    Heninger, Nadia
    Moore, Jonathan
    Naehrig, Michael
    Wustrow, Eric
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 157 - 175
  • [8] Elliptic-curve cryptography
    Fernandes, AD
    [J]. DR DOBBS JOURNAL, 1999, 24 (12): : 56 - +
  • [9] The State of Elliptic Curve Cryptography
    Neal Koblitz
    Alfred Menezes
    Scott Vanstone
    [J]. Designs, Codes and Cryptography, 2000, 19 : 173 - 193
  • [10] A survey of elliptic curve cryptography
    Istanbul University, Engineering Faculty, Computer Engineering Dept., 34320 Avcilar, Istanbul, Turkey
    [J]. Istanb. Univ. J. Electr. Electron. Eng., 2006, 2 (211-221):