Computing the Characteristic Polynomials of a Class of Hyperelliptic Curves for Cryptographic Applications

نویسندگان

  • Lin You
  • Guangguo Han
  • Jiwen Zeng
  • Yongxuan Sang
چکیده

Hyperelliptic curves have been widely studied for cryptographic applications, and some special hyperelliptic curves are often considered to be used in practical cryptosystems. Computing Jacobian group orders is an important operation in constructing hyperelliptic curve cryptosystems, and the most common method used for the computation of Jacobian group orders is by computing the zeta functions or the characteristic polynomials of the related hyperelliptic curves. For the hyperelliptic curve Cq: v2 u au b over the field q with q being a power of an odd prime p, Duursma and Sakurai obtained its characteristic polynomial for q p, a −1, and b ∈ p . In this paper, we determine the characteristic polynomials of Cq over the finite field pn for n 1, 2 and a, b ∈ Fpn . We also give some computational data which show that many of those curves have large prime factors in their Jacobian group orders, which are both practical and vital for the constructions of efficient and secure hyperelliptic curve cryptosystems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation

In this paper, we present for the first time efficient explicit formulas for arithmetic in the degree 0 divisor class group of a real hyperelliptic curve. Hereby, we consider real hyperelliptic curves of genus 2 given in affine coordinates for which the underlying finite field has characteristic > 3. These formulas are much faster than the optimized generic algorithms for real hyperelliptic cur...

متن کامل

Computational Aspects of Jacobians of Hyperelliptic Curves

Nowadays, one area of research in cryptanalysis is solving the Discrete Logarithm Problem (DLP) in finite groups whose group representation is not yet exploited. For such groups, the best one can do is using a generic method to attack the DLP, the fastest of which remains the Pollard rho algorithm with r-adding walks. For the first time, we rigorously analyze the Pollard rho method with r-addin...

متن کامل

Correspondences on Hyperelliptic Curves and Applications to the Discrete Logarithm

The discrete logarithm is an important crypto primitive for public key cryptography. The main source for suitable groups are divisor class groups of carefully chosen curves over finite fields. Because of index-calculus algorithms one has to avoid curves of genus ≥ 4 and non-hyperelliptic curves of genus 3. An important observation of Smith [S] is that for “many” hyperelliptic curves of genus 3 ...

متن کامل

Algorithmes et arithmétique pour l'implémentation de couplages cryptographiques

Pairings are cryptographic primitives which are now used in numerousprotocols. Computing and implementing them efficiently is then an interestingchallenge relying on an algorithmic and arithmetic study of those mathematicalfunctions.More precisely, pairings are bilinear maps defined over elliptic and hyperellipticcurves. Among those, we restrict our study to supersingular cu...

متن کامل

Cryptographic Aspects of Real Hyperelliptic Curves

In this paper, we give an overview of cryptographic applications using real hyperelliptic curves. We review previously proposed cryptographic protocols and discuss the infrastructure of a real hyperelliptic curve, the mathematical structure underlying all these protocols. We then describe recent improvements to infrastructure arithmetic, including explicit formulas for divisor arithmetic in gen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014