Efficient Supersingularity Testing of Elliptic Curves Using Legendre Curves

نویسندگان

چکیده

There are two types of elliptic curves, ordinary curves and supersingular curves. In 2012, Sutherland proposed an efficient almost deterministic algorithm for determining whether a given curve is or supersingular. Sutherland's based on sequences isogenies started from the input curve, computation each isogeny requires square root computations, which dominant cost algorithm. this paper, we reduce to approximately half original. contrast using j-invariants modular polynomials, our Legendre form simplifies expression isogeny. Moreover, by carefully selecting type be computed, succeeded in gathering computations at consecutive steps into just single fourth (with experimentally same as computation). The results experiments Magma supporting argument; cases characteristic p 768-bit 1024-bit lengths, ≡ 1 (mod 4) runs about 61.5% time 3 also 54.9% compared

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Legendre elliptic curves over finite fields

Throughout this paper, q > 1 denotes a power of an odd prime number p, and k is a field. Given two elliptic curves E/k and E′/k, all morphisms from E to E′ are understood to be defined over k. In particular, we simply write End(E) for the ring of all endomorphisms of E/k. The notation E ≃ E′ indicates that E is isomorphic to E′, and E ∼ E′ means that E and E′ are isogenous. The endomorphism of ...

متن کامل

An Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves

‎In a (t,n)-threshold secret sharing scheme‎, ‎a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together‎, ‎but no group of fewer than t participants can do‎. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao‎, ‎and the intractability of the elliptic curve discrete logar...

متن کامل

Legendre Transformations of Curves

In a recent paper of Wintner [l ], an extension is made of a classical theorem on the Legendre transformation of a convex function (for details of the proof, see [3], and for related results, cf. [4; 5]). His assumptions are that the function be strictly convex and of class C1. Here we shall prove a more general result which eliminates both of these restrictions and shows that, in a sense, they...

متن کامل

Efficient Indifferentiable Hashing into Ordinary Elliptic Curves

We provide the first construction of a hash function into ordinary elliptic curves that is indifferentiable from a random oracle, based on Icart’s deterministic encoding from Crypto 2009. While almost as efficient as Icart’s encoding, this hash function can be plugged into any cryptosystem that requires hashing into elliptic curves, while not compromising proofs of security in the random oracle...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

سال: 2023

ISSN: ['1745-1337', '0916-8508']

DOI: https://doi.org/10.1587/transfun.2022dmp0002