Koblitz curve cryptosystems (Q1779327): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / reviewed by
 
Property / reviewed by: Juan G. Tena Ayuso / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.ffa.2004.07.001 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2058562429 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computing in the Jacobian of a Hyperelliptic Curve / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4417413 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved low-density subset sum algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502491 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public key cryptosystem and a signature scheme based on discrete logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Methods for Calculating Vectors of Short Length in a Lattice, Including a Complexity Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography – PKC 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast addition on non-hyperelliptic genus 3 curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474195 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructive and destructive facets of Weil descent on elliptic curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2762749 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536202 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4736431 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice attacks on digital signature schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hyperelliptic cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035791 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4530230 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Formulae for arithmetic on genus 2 hyperelliptic curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collisions in fast generation of ideal classes and points on hyperelliptic and elliptic curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4871722 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reducing elliptic curve logarithms to logarithms in a finite field / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4718481 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724449 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3211242 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4318707 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast multiplication on elliptic curves over small fields of characteristic two / rank
 
Normal rank
Property / cites work
 
Property / cites work: The insecurity of the elliptic curve digital signature algorithm with partially known nonces / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941845 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737244 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elliptic curve cryptosystems over small fields of odd characteristic / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364563 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient arithmetic on Koblitz curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic function fields and codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250816 / rank
 
Normal rank

Latest revision as of 11:56, 10 June 2024

scientific article
Language Label Description Also known as
English
Koblitz curve cryptosystems
scientific article

    Statements

    Koblitz curve cryptosystems (English)
    0 references
    0 references
    1 June 2005
    0 references
    In elliptic and hyperelliptic Public Key Cryptography one needs to compute scalar multiples of a point of the curve or a divisor of its Jacobian. It is then crucial having methods to speed up such an arithmetic operation. In her Ph.D. Thesis [Efficient arithmetic on hyperelliptic curves, University Essen (2001; Zbl 1047.94008)] and several papers the author addressed the problem of efficiently carring out the arithmetic in hyperelliptic curves. The present paper investigates the use of Koblitz hyperelliptic curves (curves defined over and small finite field and consider over a large extension field). The use of Koblitz curves was proposed by \textit{N. Koblitz}, [Crypto'91, Lect. Notes Comput. Sci. 576, 279--287 (1992; Zbl 0780.14018)]. For these curves the point counting is easy and \textit{A. J. Menezes} and \textit{S. Vanstone} [Auscrypt 90, Lect. Notes Comput. Sci. 453, 2--13 (1990; Zbl 0722.94012)] proposed the use of the Frobenius endomorphism to speed up the computation of scalar multiples of a point, using a certain scalar's expansion. Several authors studied the generalization of Koblitz idea to hyperelliptic curves. This paper presents new techniques to apply the Frobenius endomorphism to the computation of scalar multiples and investigates the properties of the expansions. The author claims that her approach is different from alternative ones [\textit{Y. Choie} and \textit{J. W. Lee}, Indocrypt 2002, Lect. Notes Comput. Sci. 2551, 285--295 (2002; Zbl 1033.11504); \textit{Y.-H. Park, S. Jeong} and \textit{J. Lim}, Eurocrypt 2002, Lect. Notes Comput. Sci. 2332, 197--208 (2002; Zbl 1055.94022)] ``as our expansions are shorter and are proven to be finite''. Section 2 and 3 recall the needed mathematical background. The core of the paper is Section 4 where the main results and algorithms are provided. The author shows that for \(m\sim q^{gn}\)\, the computation of \(mD\) needs only \(\sim n^{(q^g-1)/q^g}\) group operations (the drawback is that \((q^g-1/2)\) elements need to be precomputed and stored). As an alternative approach the paper (Section 5) investigates the idea (due to Koblitz) of using an expansion of fixing length, not caring to which integer it corresponds. Section 6 provides a concrete example for a binary curve of genus three.
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    cryptography
    0 references
    discrete logarithm systems
    0 references
    hyperelliptic curves
    0 references
    Koblitz curves
    0 references
    Frobenius expansions
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references