Research Interests Juliana v. Belding Number Theoretic Algorithms for Elliptic Curves with Cryptographic Applications
نویسنده
چکیده
An elliptic curve over a field K is given by an equation of the form y2 = x3 + Ax+B. There is a natural way to add any two points on the curve to get a third point, and therefore the set of points of the curve with coordinates in K form a group, denoted E(K). Elliptic curves have long fascinated mathematicians, as they can be approached from many angles, including complex analysis, number theory and algebraic geometry. In the past twenty years, elliptic curves have gained even more attention: elliptic curves over Q play a key role in the proof of Fermat’s Last Theorem, while elliptic curves over finite fields come into play when we exchange private information securely over the internet. My work relates directly to this latter role, the use of elliptic curves in cryptography. Since first proposed in 1985, much research has been devoted to the problem of constructing “cryptographic” elliptic curves. For a finite field K of p elements, the group E(K) is finite, of order N roughly the same size as the prime p. The discrete logarithm problem (DLP) is:
منابع مشابه
Curves, Cryptography, and Primes of the Form x + yD
An ongoing challenge in cryptography is to find groups in which the discrete log problem “hard”, or computationally infeasible. Such a group can be used as the setting for many cryptographic protocols, from DiffieHellman key exchange to El Gamal encryption. As the group of points of an elliptic curve over a finite field is one of the few known examples, it is important to be able to efficiently...
متن کاملThe Discrete Logarithm Problem on the p-torsion Subgroup of Elliptic Curves
An ongoing challenge in cryptography is to find groups in which the DLP is computationally infeasible, that is, for which the best known attack is exponential in log(N). Such a group can be used as the setting for many cryptographic protocols, from Diffie-Hellman key exchange to El Gamal encryption ([14], 159). The most prominent example, first proposed in 1985, is a subgroup of points of an el...
متن کاملEfficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملA Weil pairing on the p-torsion of ordinary elliptic curves over K[ ]
For an elliptic curve E over any field K, the Weil pairing en is a bilinear map on n-torsion. For K of characteristic p > 0, the map en is degenerate if and only if n is divisible by p. In this paper, we consider E over the dual numbers K[ ] and define a non-degenerate “Weil pairing on p-torsion” which shares many of the same properties of the Weil pairing. We also show that the discrete logari...
متن کاملA WEIL PAIRING ON THE p-TORSION OF ORDINARY ELLIPTIC CURVES OVER K[ǫ]
For an elliptic curve E over any field K, the Weil pairing en is a bilinear map on n-torsion. For K of characteristic p > 0, the map en is degenerate if and only if n is divisible by p. In this paper, we consider E over the dual numbers K[ǫ] and define a non-degenerate “Weil pairing on ptorsion” which shares many of the same properties of the Weil pairing. We also show that the discrete logarit...
متن کامل