Fast hashing onto elliptic curves over fields of characteristic 3
نویسندگان
چکیده
We describe a fast hash algorithm that maps arbitrary messages onto points of an elliptic curve defined over a finite field of characteristic 3. Our new scheme runs in time O(m) for curves over F3m . The best previous algorithm for this task runs in time O(m). Experimental data confirms the speedup by a factor O(m), or approximately a hundred times for practical m values. Our results apply for both standard and normal basis representations of F3m .
منابع مشابه
Fast hashing onto pairing-friendly elliptic curves over ternary fields
We propose a fast cryptographic hash algorithm that maps arbitrary messages onto points of pairing-friendly elliptic curves defined over F3m , a core operation in many pairing-based cryptosystems. Our scheme runs in time O(m2), while the best previous algorithm for this task runs in time O(m3). Experimental data confirms the speedup by a factor O(m), or approximately a hundred times for practic...
متن کاملFast Hashing to G2 on Pairing-Friendly Curves
When using pairing-friendly ordinary elliptic curves over prime fields to implement identity-based protocols, there is often a need to hash identities to points on one or both of the two elliptic curve groups of prime order r involved in the pairing. Of these G1 is a group of points on the base field E(Fp) and G2 is instantiated as a group of points with coordinates on some extension field, ove...
متن کاملFast Point Multiplication on Elliptic Curves through Isogenies
Elliptic curve cryptosystems are usually implemented over fields of characteristic two or over (large) prime fields. For large prime fields, projective coordinates are more suitable as they reduce the computational workload in a point multiplication. In this case, choosing for parameter a the value −3 further reduces the workload. Over Fp, not all elliptic curves can be rescaled through isomorp...
متن کاملEfficient Indifferentiable Hashing into Ordinary Elliptic Curves
We provide the first construction of a hash function into ordinary elliptic curves that is indifferentiable from a random oracle, based on Icart’s deterministic encoding from Crypto 2009. While almost as efficient as Icart’s encoding, this hash function can be plugged into any cryptosystem that requires hashing into elliptic curves, while not compromising proofs of security in the random oracle...
متن کاملHuff's Model for Elliptic Curves
This paper revisits a model for elliptic curves over Q introduced by Huff in 1948 to study a diophantine problem. Huff’s model readily extends over fields of odd characteristic. Every elliptic curve over such a field and containing a copy of Z/4Z× Z/2Z is birationally equivalent to a Huff curve over the original field. This paper extends and generalizes Huff’s model. It presents fast explicit f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2001 شماره
صفحات -
تاریخ انتشار 2001