Research Interests Juliana v. Belding Number Theoretic Algorithms for Elliptic Curves with Cryptographic Applications

نویسنده

  • Juliana V. Belding
چکیده

An elliptic curve over a field K is given by an equation of the form y2 = x3 + Ax+B. There is a natural way to add any two points on the curve to get a third point, and therefore the set of points of the curve with coordinates in K form a group, denoted E(K). Elliptic curves have long fascinated mathematicians, as they can be approached from many angles, including complex analysis, number theory and algebraic geometry. In the past twenty years, elliptic curves have gained even more attention: elliptic curves over Q play a key role in the proof of Fermat’s Last Theorem, while elliptic curves over finite fields come into play when we exchange private information securely over the internet. My work relates directly to this latter role, the use of elliptic curves in cryptography. Since first proposed in 1985, much research has been devoted to the problem of constructing “cryptographic” elliptic curves. For a finite field K of p elements, the group E(K) is finite, of order N roughly the same size as the prime p. The discrete logarithm problem (DLP) is:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Curves, Cryptography, and Primes of the Form x + yD

An ongoing challenge in cryptography is to find groups in which the discrete log problem “hard”, or computationally infeasible. Such a group can be used as the setting for many cryptographic protocols, from DiffieHellman key exchange to El Gamal encryption. As the group of points of an elliptic curve over a finite field is one of the few known examples, it is important to be able to efficiently...

متن کامل

The Discrete Logarithm Problem on the p-torsion Subgroup of Elliptic Curves

An ongoing challenge in cryptography is to find groups in which the DLP is computationally infeasible, that is, for which the best known attack is exponential in log(N). Such a group can be used as the setting for many cryptographic protocols, from Diffie-Hellman key exchange to El Gamal encryption ([14], 159). The most prominent example, first proposed in 1985, is a subgroup of points of an el...

متن کامل

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

A Weil pairing on the p-torsion of ordinary elliptic curves over K[ ]

For an elliptic curve E over any field K, the Weil pairing en is a bilinear map on n-torsion. For K of characteristic p > 0, the map en is degenerate if and only if n is divisible by p. In this paper, we consider E over the dual numbers K[ ] and define a non-degenerate “Weil pairing on p-torsion” which shares many of the same properties of the Weil pairing. We also show that the discrete logari...

متن کامل

A WEIL PAIRING ON THE p-TORSION OF ORDINARY ELLIPTIC CURVES OVER K[ǫ]

For an elliptic curve E over any field K, the Weil pairing en is a bilinear map on n-torsion. For K of characteristic p > 0, the map en is degenerate if and only if n is divisible by p. In this paper, we consider E over the dual numbers K[ǫ] and define a non-degenerate “Weil pairing on ptorsion” which shares many of the same properties of the Weil pairing. We also show that the discrete logarit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007