45 research outputs found

    Condition on composite numbers easily factored with elliptic curve method

    Get PDF
    For a composite integer NN that we would like to factor, we consider a condition for the elliptic curve method using NN as a scalar value to succeed and show that if NN has a prime factor pp such that p=(DV2+1)/4, VZ, D{p=(DV^2+1)/4,\ V \in {\mathbb Z},\ D\in \{3, 11, 19, 35, 43, 51, 67, 91, 115, 123, 163, 187, 235, 267, 403, 427}\}, we can find a non-trivial divisor of NN (multiple of pp) in a short time. In the authors\u27 implementation on PARI/GP, a 1024-bit NN was factored in a few seconds when pp was 512 bits

    Universally Constructing 12-th Degree Extension Field for Ate Pairing

    Get PDF
    We need to perform arithmetic in \Fpt to use Ate pairing on a Barreto-Naehrig (BN) curve, where p(z)p(z) is a prime given by p(z)=36z4+36z3+24z2+6z+1p(z)=36z^4+36z^3+24z^2+6z+1 with an integer zz. In many implementations of Ate pairing, \Fpt has been regarded as the 6-th extension of \Fpp, and it has been constructed as \Fpt=\Fpp[v]/(v^6-\xi) for an element \xi\in \Fpp such that v6ξv^6-\xi is irreducible in \Fpp[v]. Such ξ\xi depends on the value of p(z)p(z), and we may use mathematic software to find ξ\xi. This paper shows that when z7,11(mod12)z \equiv 7,11 \pmod{12} we can universally construct \Fpp as \Fpt=\Fpp[v]/(v^6-u-1), where \Fpp=\Fp[u]/(u^2+1)

    Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves -

    Get PDF
    This paper describes a method for constructing Barreto-Naehrig (BN) curves and twists of BN curves that are pairing-friendly and have the embedding degree 1212 by using just primality tests without a complex multiplication (CM) method. Specifically, this paper explains that the number of points of elliptic curves y2=x3±16y^2=x^3\pm 16 and y2=x3±2y^2=x^3 \pm 2 over \Fp is given by 6 polynomials in zz, n0(z),,n5(z)n_0(z),\cdots, n_5(z), two of which are irreducible, classified by the value of zmod12z\bmod{12} for a prime p(z)=36z4+36z3+24z2+6z+1p(z)=36z^4+36z^3+24z^2+6z+1 with zz an integer. For example, elliptic curve y2=x3+2y^2=x^3+2 over \Fp always becomes a BN curve for any zz with z2,11 ⁣ ⁣ ⁣(mod12)z \equiv 2,11\!\!\!\pmod{12}. Let ni(z)n_i(z) be irreducible. Then, to construct a pairing-friendly elliptic curve, it is enough to find an integer zz of appropriate size such that p(z)p(z) and ni(z)n_i(z) are primes

    Reduction of Search-LWE Problem to Integer Programming Problem

    Get PDF
    Let (A,t)(A,t) be an instance of the search-LWE problem, where AA is a matrix and tt is a vector. This paper constructs an integer programming problem using AA and tt, and shows that it is possible to derive a solution of the instance (A,t)(A,t) (perhaps with high probability) using its optimal solution or its tentative solution of small norm output by an integer programming solver. In other words, the LWE-search problem can be reduced to an integer programming problem. In the reduction, only basic linear algebra and finite field calculation are required. The computational complexity of the integer programming problem obtained is still unknown

    Analysis and Improvement of Authenticatable Ring Signcryption Scheme

    Get PDF
    Ring signcryption is an anonymous signcryption which allows a user to anonymously signcrypt a message on behalf of a set of users including himself. In an ordinary ring signcryption scheme, even if a user of the ring generates a signcryption, he also cannot prove that the signcryption was produced by himself. In 2008, Zhang, Yang, Zhu, and Zhang solve the problem by introducing an identity-based authenticatable ring signcryption scheme (denoted as the ZYZZ scheme). In the ZYZZ scheme, the actual signcrypter can prove that the ciphertext is generated by himself, and the others cannot authenticate it. However, in this paper, we show that the ZYZZ scheme is not secure against chosen plaintext attacks. Furthermore, we propose an improved scheme that remedies the weakness of the ZYZZ scheme. The improved scheme has shorter ciphertext size than the ZYZZ scheme. We then prove that the improved scheme satisfies confidentiality, unforgeability, anonymity and authenticatability

    Identity-Based Hybrid Signcryption

    Get PDF
    Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we address a question whether it is possible to construct a hybrid signcryption scheme in identity-based setting. This question seems to have never been addressed in the literature. We answer the question positively in this paper. In particular, we extend the concept of signcryption key encapsulation mechanism to the identity-based setting. We show that an identity-based signcryption scheme can be constructed by combining an identity-based signcryption key encapsulation mechanism with a data encapsulation mechanism. We also give an example of identity-based signcryption key encapsulation mechanism

    FPGA and ASIC Implementations of the ηT\eta_T Pairing in Characteristic Three

    Get PDF
    Since their introduction in constructive cryptographic applications, pairings over (hyper)elliptic curves are at the heart of an ever increasing number of protocols. As they rely critically on efficient algorithms and implementations of pairing primitives, the study of hardware accelerators became an active research area. In this paper, we propose two coprocessors for the reduced ηT\eta_T pairing introduced by Barreto {\it et al.} as an alternative means of computing the Tate pairing on supersingular elliptic curves. We prototyped our architectures on FPGAs. According to our place-and-route results, our coprocessors compare favorably with other solutions described in the open literature. We also present the first ASIC implementation of the reduced ηT\eta_T pairing
    corecore