Efficient Supersingularity Testing of Elliptic Curves Using Legendre Curves
نویسندگان
چکیده
There are two types of elliptic curves, ordinary curves and supersingular curves. In 2012, Sutherland proposed an efficient almost deterministic algorithm for determining whether a given curve is or supersingular. Sutherland's based on sequences isogenies started from the input curve, computation each isogeny requires square root computations, which dominant cost algorithm. this paper, we reduce to approximately half original. contrast using j-invariants modular polynomials, our Legendre form simplifies expression isogeny. Moreover, by carefully selecting type be computed, succeeded in gathering computations at consecutive steps into just single fourth (with experimentally same as computation). The results experiments Magma supporting argument; cases characteristic p 768-bit 1024-bit lengths, ≡ 1 (mod 4) runs about 61.5% time 3 also 54.9% compared
منابع مشابه
Legendre elliptic curves over finite fields
Throughout this paper, q > 1 denotes a power of an odd prime number p, and k is a field. Given two elliptic curves E/k and E′/k, all morphisms from E to E′ are understood to be defined over k. In particular, we simply write End(E) for the ring of all endomorphisms of E/k. The notation E ≃ E′ indicates that E is isomorphic to E′, and E ∼ E′ means that E and E′ are isogenous. The endomorphism of ...
متن کاملAn Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
متن کاملLegendre Transformations of Curves
In a recent paper of Wintner [l ], an extension is made of a classical theorem on the Legendre transformation of a convex function (for details of the proof, see [3], and for related results, cf. [4; 5]). His assumptions are that the function be strictly convex and of class C1. Here we shall prove a more general result which eliminates both of these restrictions and shows that, in a sense, they...
متن کاملEfficient Indifferentiable Hashing into Ordinary Elliptic Curves
We provide the first construction of a hash function into ordinary elliptic curves that is indifferentiable from a random oracle, based on Icart’s deterministic encoding from Crypto 2009. While almost as efficient as Icart’s encoding, this hash function can be plugged into any cryptosystem that requires hashing into elliptic curves, while not compromising proofs of security in the random oracle...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
سال: 2023
ISSN: ['1745-1337', '0916-8508']
DOI: https://doi.org/10.1587/transfun.2022dmp0002