Scalar Multiplication on Pairing Friendly Elliptic Curves

نویسندگان

  • Naoki Kanayama
  • Tadanori Teruya
  • Eiji Okamoto
چکیده

Efficient computation of elliptic curve scalar multiplication has been a significant problem since Koblitz [13] and Miller [14] independently proposed elliptic curve cryptography, and several efficient methods of scalar multiplication have been proposed (e.g., [8], [9], [12]). A standard approach for computing scalar multiplication is to use the Frobenius endomorphism. If we compute the s-multiplication on a point Q, denoted by [s]Q (see Sect. 2.1), on an elliptic curve E over a finite field Fq of characteristic p, we expand s in base q and apply [q]Q = −πq(Q)+ [t]πq(Q) (where t is the trace of the Frobenius endomorphism πq). This approach is very useful for small characteristic p (e.g., p = 2, 3). Kobayashi et al. [12] proposed an efficient method for the relatively large characteristic case. Since Boneh et al. [2] and Sakai et al. [17] independently proposed ID-based cryptosystems using pairings, pairing-based cryptography has been a subject of great interest in cryptography. The fundamental components of several pairing-based cryptosystems are pairing computation and elliptic curve scalar multiplication. The standard approach using the Frobenius endomorphism is useful for supersingular elliptic curves over small characteristic finite fields (e.g., F2m or F3m ). However, the Frobenius endomorphism is difficult to apply directly to elliptic curves over prime finite fields of large characteristic p because p is generally larger than the scalar s. Therefore, it is necessary to find a good “base” in which to expand s. In the present paper, we propose elliptic curve scalar multiplication methods using the concepts of Atei pairing [21] and optimal pairing [22]. We can reduce the number of group operations over an elliptic curve by using these pro-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields

Recently, the supersingular elliptic curves over ternary fields are widely used in pairing based crypto-applications since they achieve the best possible ratio between security level and space requirement. We propose new algorithms for projective arithmetic on the curves, where the point tripling is field multiplication free, and point addition and point doubling requires one field multiplicati...

متن کامل

Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three

We describe new algorithms for performing scalar multiplication on supersingular elliptic curves in characteristic three. These curves can be used in pairing-based cryptography. Since in pairing-based protocols besides pairing computations also scalar multiplications are required, and the performance of the latter is not negligible, improving it is clearly important as well. The techniques pres...

متن کامل

Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures

Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user's public key based on the user's identity. However, computational require...

متن کامل

Point Multiplication on Supersingular Elliptic Curves Defined over Fields of Characteristic 2 and 3

Elliptic curve cryptosystem protocols use two main operations, the scalar multiplication and the pairing computation. Both of them are done through a chain of basic operation on the curve. In this paper we present new formulas for supersingular elliptic curve in characteristic 2 and 3. We improve best known formulas by at least one multiplication in the field.

متن کامل

Fast Hashing to G2 on Pairing-Friendly Curves

When using pairing-friendly ordinary elliptic curves over prime fields to implement identity-based protocols, there is often a need to hash identities to points on one or both of the two elliptic curve groups of prime order r involved in the pairing. Of these G1 is a group of points on the base field E(Fp) and G2 is instantiated as a group of points with coordinates on some extension field, ove...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEICE Transactions

دوره 94-A  شماره 

صفحات  -

تاریخ انتشار 2011