Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography

نویسندگان

  • Nadia El Mrabet
  • Christophe Nègre
چکیده

Pairings over ellitpic curve use fields Fpk with p ≥ 2 and 6 < k ≤ 32. In this paper we propose to represent elements in Fp with AMNS sytem of [1]. For well chosen AMNS we get roots of unity with sparse representation. The multiplication by these roots are thus really efficient in Fp. The DFT/FFT approach for multiplication in extension field Fpk is thus optimized. The resulting complexity of a multiplication in Fpk combining AMNS and DFT is about 50% less than the previously recommended approach [11].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Finite field multiplication combining AMNS and DFT approach for pairing cryptography

Pairings over ellitpic curve use fields Fpk with p ≥ 2 and 6 < k ≤ 32. In this paper we propose to represent elements in Fp with AMNS sytem of [1]. For well chosen AMNS we get roots of unity with sparse representation. The multiplication by these roots are thus really efficient in Fp. The DFT/FFT approach for multiplication in extension field Fpk is thus optimized. The resulting complexity of a...

متن کامل

Scalar Multiplication on Pairing Friendly Elliptic Curves

Efficient computation of elliptic curve scalar multiplication has been a significant problem since Koblitz [13] and Miller [14] independently proposed elliptic curve cryptography, and several efficient methods of scalar multiplication have been proposed (e.g., [8], [9], [12]). A standard approach for computing scalar multiplication is to use the Frobenius endomorphism. If we compute the s-multi...

متن کامل

Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography

We introduce an efficient method for computing Montgomery products of polynomials in the frequency domain. The discrete Fourier transform (DFT) based method originally proposed for integer multiplication provides an extremely efficient method with the best asymptotic complexity, i.e. O(m log m log log m), for multiplication of m-bit integers or (m−1)st degree polynomials. Unfortunately, the DFT...

متن کامل

A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems

The arithmetic in a finite field constitutes the core of Public Key Cryptography like RSA, ECC or pairing-based cryptography. This paper discusses an efficient hardware implementation of the Coarsely Integrated Operand Scanning method (CIOS) of Montgomery modular multiplication combined with an effective systolic architecture designed with a Two-dimensional array of Processing Elements. The sys...

متن کامل

Efficient Implementation of Pairing-Based Cryptography on a Sensor Node

Pairing-based cryptography provides us many novel cryptographic applications such as ID-based cryptosystems and efficient broadcast encryptions. The security problems in ubiquitous sensor networks have been discussed in many papers, and pairing-based cryptography is a crucial technique to solve them. Due to the limited resources in the current sensor node, it is challenged to optimize the imple...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009