Constructive and destructive facets of Weil descent on elliptic curves

被引:0
|
作者
P. Gaudry
F. Hess
N. P. Smart
机构
[1] LIX,School of Mathematics and Statistics F07
[2] École Polytechnique,Computer Science Department
[3] University of Sydney,undefined
[4] University of Bristol,undefined
来源
Journal of Cryptology | 2002年 / 15卷
关键词
Function fields; Divisor class group; Cryptography; Elliptic curves;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper we look in detail at the curves which arise in the method of Galbraith and Smart for producing curves in the Weil restriction of an elliptic curve over a finite field of characteristic 2 of composite degree. We explain how this method can be used to construct hyperelliptic cryptosystems which could be as secure as cryptosystems based on the original elliptic curve. On the other hand, we show that the same technique may provide a way of attacking the original elliptic curve cryptosystem using recent advances in the study of the discrete logarithm problem on hyperelliptic curves.
引用
收藏
页码:19 / 46
页数:27
相关论文
共 50 条
  • [1] Constructive and destructive facets of Weil descent on elliptic curves
    Gaudry, P
    Hess, F
    Smart, NR
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (01) : 19 - 46
  • [2] Constructive and destructive facets of weil descent on elliptic curves
    Smart, Nigel
    Hess, Florian
    Gaudry, Pierrick
    [J]. HP Laboratories Technical Report, 2000, (10):
  • [3] Limitations of constructive Weil descent
    Galbraith, SD
    [J]. PUBLIC-KEY CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, : 59 - 70
  • [4] Weil descent of elliptic curves over finite fields of characteristic three
    Arita, S
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 248 - 258
  • [5] Weil descent attack of elliptic curves over finite fields of characteristic three
    Arita, S
    [J]. NEC RESEARCH & DEVELOPMENT, 2002, 43 (03): : 188 - 190
  • [6] Weil descent attack of elliptic curves over finite fields of characteristic three
    Arita, Seigo
    [J]. NEC Research and Development, 2002, 43 (03): : 188 - 190
  • [7] Infinite descent on elliptic curves
    Siksek, S
    [J]. ROCKY MOUNTAIN JOURNAL OF MATHEMATICS, 1995, 25 (04) : 1501 - 1538
  • [8] EXPLICIT ISOGENY DESCENT ON ELLIPTIC CURVES
    Miller, Robert L.
    Stoll, Michael
    [J]. MATHEMATICS OF COMPUTATION, 2013, 82 (281) : 513 - 529
  • [9] Improved Weil and Tate pairings for elliptic and hyperelliptic curves
    Eisenträger, K
    Lauter, K
    Montgomery, PL
    [J]. ALGORITHMIC NUMBER THEORY, PROCEEDINGS, 2004, 3076 : 169 - 183
  • [10] Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography
    M. Barbosa
    A. Moss
    D. Page
    [J]. Journal of Cryptology, 2009, 22 : 259 - 281