45 research outputs found
Condition on composite numbers easily factored with elliptic curve method
For a composite integer that we would like to factor, we consider a condition for the elliptic curve method using as a scalar value to succeed and show that if has a prime factor such that 3, 11, 19, 35, 43, 51, 67, 91, 115, 123, 163, 187, 235, 267, 403, 427, we can find a non-trivial divisor of (multiple of ) in a short time. In the authors\u27 implementation on PARI/GP, a 1024-bit was factored in a few seconds when was 512 bits
Universally Constructing 12-th Degree Extension Field for Ate Pairing
We need to perform arithmetic in \Fpt to use Ate pairing on a Barreto-Naehrig (BN) curve, where is a prime given by with an integer . In many implementations of Ate pairing, \Fpt has been regarded as the 6-th extension of \Fpp, and it has been constructed as \Fpt=\Fpp[v]/(v^6-\xi) for an element \xi\in \Fpp such that is irreducible in \Fpp[v]. Such depends on the value of , and we may use mathematic software to find . This paper shows that when we can universally construct \Fpp as \Fpt=\Fpp[v]/(v^6-u-1), where \Fpp=\Fp[u]/(u^2+1)
Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves -
This paper describes a method for constructing Barreto-Naehrig (BN) curves and twists of BN curves that are pairing-friendly and have the embedding degree by using just primality tests without a complex multiplication (CM) method.
Specifically, this paper explains that the number of points of elliptic curves and over \Fp is given by 6 polynomials in , , two of which are irreducible, classified by the value of for a prime with an integer.
For example, elliptic curve over \Fp always becomes a BN curve for any with .
Let be irreducible.
Then, to construct a pairing-friendly elliptic curve, it is enough to find an integer of appropriate size such that and are primes
Reduction of Search-LWE Problem to Integer Programming Problem
Let be an instance of the search-LWE problem, where is a matrix and is a vector. This paper constructs an integer programming problem using and , and shows that it is possible to derive a solution of the instance (perhaps with high probability) using its optimal solution or its tentative solution of small norm output by an integer programming solver. In other words, the LWE-search problem can be reduced to an integer programming problem. In the reduction, only basic linear algebra and finite field calculation are required. The computational complexity of the integer programming problem obtained is still unknown
Analysis and Improvement of Authenticatable Ring Signcryption Scheme
Ring signcryption is an anonymous signcryption which allows a user
to anonymously signcrypt a message on behalf of a set of users
including himself. In an ordinary ring signcryption scheme, even if
a user of the ring generates a signcryption, he also cannot prove
that the signcryption was produced by himself. In 2008, Zhang, Yang,
Zhu, and Zhang solve the problem by introducing an identity-based
authenticatable ring signcryption scheme (denoted as the ZYZZ
scheme). In the ZYZZ scheme, the actual signcrypter can prove that
the ciphertext is generated by himself, and the others cannot
authenticate it. However, in this paper, we show that the ZYZZ
scheme is not secure against chosen plaintext attacks. Furthermore,
we propose an improved scheme that remedies the weakness of the ZYZZ
scheme. The improved scheme has shorter ciphertext size than the
ZYZZ scheme. We then prove that the improved scheme satisfies
confidentiality,
unforgeability, anonymity and authenticatability
Identity-Based Hybrid Signcryption
Signcryption is a cryptographic primitive that fulfills both the
functions of digital signature and public key encryption
simultaneously, at a cost significantly lower than that required by
the traditional signature-then-encryption approach. In this paper,
we address a question whether it is possible to construct a hybrid
signcryption scheme in identity-based setting. This question seems
to have never been addressed in the literature. We answer the
question positively in this paper. In particular, we extend the
concept of signcryption key encapsulation mechanism to the
identity-based setting. We show that an identity-based signcryption
scheme can be constructed by combining an identity-based
signcryption key encapsulation mechanism with a data encapsulation
mechanism. We also give an example of identity-based signcryption
key encapsulation mechanism
FPGA and ASIC Implementations of the Pairing in Characteristic Three
Since their introduction in constructive cryptographic applications, pairings over (hyper)elliptic curves are at the heart of an ever increasing number of protocols. As they rely critically on efficient algorithms and implementations of pairing primitives, the study of hardware accelerators became an active research area.
In this paper, we propose two coprocessors for the reduced pairing introduced by Barreto {\it et al.} as an alternative means of computing the Tate pairing on supersingular elliptic curves. We prototyped our architectures on FPGAs. According to our place-and-route results, our coprocessors compare favorably with other solutions described in the open literature. We also present the first ASIC implementation of the reduced pairing