Scalar Multiplication on Pairing Friendly Elliptic Curves
نویسندگان
چکیده
Efficient computation of elliptic curve scalar multiplication has been a significant problem since Koblitz [13] and Miller [14] independently proposed elliptic curve cryptography, and several efficient methods of scalar multiplication have been proposed (e.g., [8], [9], [12]). A standard approach for computing scalar multiplication is to use the Frobenius endomorphism. If we compute the s-multiplication on a point Q, denoted by [s]Q (see Sect. 2.1), on an elliptic curve E over a finite field Fq of characteristic p, we expand s in base q and apply [q]Q = −πq(Q)+ [t]πq(Q) (where t is the trace of the Frobenius endomorphism πq). This approach is very useful for small characteristic p (e.g., p = 2, 3). Kobayashi et al. [12] proposed an efficient method for the relatively large characteristic case. Since Boneh et al. [2] and Sakai et al. [17] independently proposed ID-based cryptosystems using pairings, pairing-based cryptography has been a subject of great interest in cryptography. The fundamental components of several pairing-based cryptosystems are pairing computation and elliptic curve scalar multiplication. The standard approach using the Frobenius endomorphism is useful for supersingular elliptic curves over small characteristic finite fields (e.g., F2m or F3m ). However, the Frobenius endomorphism is difficult to apply directly to elliptic curves over prime finite fields of large characteristic p because p is generally larger than the scalar s. Therefore, it is necessary to find a good “base” in which to expand s. In the present paper, we propose elliptic curve scalar multiplication methods using the concepts of Atei pairing [21] and optimal pairing [22]. We can reduce the number of group operations over an elliptic curve by using these pro-
منابع مشابه
A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields
Recently, the supersingular elliptic curves over ternary fields are widely used in pairing based crypto-applications since they achieve the best possible ratio between security level and space requirement. We propose new algorithms for projective arithmetic on the curves, where the point tripling is field multiplication free, and point addition and point doubling requires one field multiplicati...
متن کاملFaster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three
We describe new algorithms for performing scalar multiplication on supersingular elliptic curves in characteristic three. These curves can be used in pairing-based cryptography. Since in pairing-based protocols besides pairing computations also scalar multiplications are required, and the performance of the latter is not negligible, improving it is clearly important as well. The techniques pres...
متن کاملConstructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user's public key based on the user's identity. However, computational require...
متن کاملPoint Multiplication on Supersingular Elliptic Curves Defined over Fields of Characteristic 2 and 3
Elliptic curve cryptosystem protocols use two main operations, the scalar multiplication and the pairing computation. Both of them are done through a chain of basic operation on the curve. In this paper we present new formulas for supersingular elliptic curve in characteristic 2 and 3. We improve best known formulas by at least one multiplication in the field.
متن کاملFast Hashing to G2 on Pairing-Friendly Curves
When using pairing-friendly ordinary elliptic curves over prime fields to implement identity-based protocols, there is often a need to hash identities to points on one or both of the two elliptic curve groups of prime order r involved in the pairing. Of these G1 is a group of points on the base field E(Fp) and G2 is instantiated as a group of points with coordinates on some extension field, ove...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEICE Transactions
دوره 94-A شماره
صفحات -
تاریخ انتشار 2011