Reducing elliptic curve logarithms to logarithms in a finite field
DOI10.1109/18.259647zbMATH Open0801.94011DBLPjournals/tit/MenezesOV93OpenAlexW2111310412WikidataQ56016750 ScholiaQ56016750MaRDI QIDQ4307376FDOQ4307376
Authors: Tatsuaki Okamoto, Scott A. Vanstone, Alfred Menezes
Publication date: 3 October 1994
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/18.259647
Recommendations
finite fieldpublic key cryptographysupersingular elliptic curvesdiscrete logarithmselliptic curve logarithm
Cites Work
- Identity-based cryptosystems and signature schemes
- Practical Identity-Based Encryption Without Random Oracles
- Hierarchical ID-Based Cryptography
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Fuzzy Identity-Based Encryption
- Certificateless public key cryptography
- Oblivious transfer and polynomial evaluation
- Advances in Cryptology - EUROCRYPT 2004
- Reducing elliptic curve logarithms to logarithms in a finite field
- Advances in Cryptology – CRYPTO 2004
- Public Key Cryptography – PKC 2004
- Reducing Trust in the PKG in Identity Based Cryptosystems
- On the Security Loss in Cryptographic Reductions
Cited In (only showing first 100 items - show all)
- Efficient Tate pairing computation using double-base chains
- New designing of cryptosystems based on quadratic fields
- Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation
- Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms
- Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates
- Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings
- Nonassociative algebraic structures in cryptography and coding
- Improving e-payment security using elliptic curve cryptosystem
- Pairing-based cryptography on elliptic curves
- On Prime-Order Elliptic Curves with Embedding Degrees k = 3, 4, and 6
- Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields
- Polynomial approximation of bilinear Diffie-Hellman maps
- Bootstrapping for approximate homomorphic encryption
- On the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve Cryptography
- Complexity bounds on Semaev's naive index calculus method for ECDLP
- Ramanujan's class invariants and their use in elliptic curve cryptography
- On the asymptotic effectiveness of Weil descent attacks
- Return of GGH15: provable security against zeroizing attacks
- Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography
- Algorithms for black-box fields and their application to cryptography
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption
- Constraining pseudorandom functions privately
- Batch RSA
- More Discriminants with the Brezing-Weng Method
- Efficient hash maps to \(\mathbb{G}_2\) on BLS curves
- Towards isogeny-based password-authenticated key establishment
- Extractors for binary elliptic curves
- Supersingular hyperelliptic curves of genus 2 over finite fields
- A brief history of pairings
- Linearizing torsion classes in the Picard group of algebraic curves over finite fields
- A self-pairing map and its applications to cryptography
- On the security of cryptosystem using automorphism groups
- An elliptic curve analogue of McCurley's key agreement scheme
- On the multi-user security of short Schnorr signatures with preprocessing
- Spreading alerts quietly and the subgroup escape problem
- Heuristics of the Cocks-Pinch method
- Isolated elliptic curves and the MOV attack
- Supersingular twisted Edwards curves over prime fields. II: Supersingular twisted Edwards curves with the \(j\)-invariant equal to \(66^3\)
- Supersingular twisted Edwards curves over prime fields. I: Supersingular twisted Edwards curves with \(j\)-invariants equal to zero and \(12^3\)
- Faster pairing computation on genus \(2\) hyperelliptic curves
- On the efficient implementation of pairing-based protocols
- On the Security of Pairing-Friendly Abelian Varieties over Non-prime Fields
- Scalable zero knowledge via cycles of elliptic curves
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
- Obstacles to the torsion-subgroup attack on the decision Diffie-Hellman Problem
- Cryptographic implications of Hess' generalized GHS attack
- A Weil pairing on the \(p\)-torsion of ordinary elliptic curves over \(K[\varepsilon]\)
- Solving discrete logarithms on a 170-bit MNT curve by pairing reduction
- The discrete logarithm problem from a local duality perspective
- On the discrete logarithm problem for prime-field elliptic curves
- Reducing the elliptic curve cryptosystem of Meyer-Müller to the cryptosystem of Rabin-Williams
- Elliptic curve lifting problem and its applications
- Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves
- Identifying supersingular elliptic curves
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery
- Software Implementation of Finite Fields of Characteristic Three, for Use in Pairing-based Cryptosystems
- Using abelian varieties to improve pairing-based cryptography
- Trapdoor DDH groups from pairings and isogenies
- Koblitz curves over quadratic fields
- Interpolation of the discrete logarithm in \(\mathbb{F}_{q}\) by Boolean functions and by polynomials in several variables modulo a divisor of \(q-1\).
- Using number fields to compute logarithms in finite fields
- Computing $(\ell ,\ell )$-isogenies in polynomial time on Jacobians of genus $2$ curves
- Reducing elliptic curve logarithms to logarithms in a finite field
- A pairing-based publicly verifiable secret sharing scheme
- Attribute-based key-insulated signature for Boolean formula
- An improved two-party identity-based authenticated key agreement protocol using pairings
- Extension of elliptic curves on Krasner hyperfields
- Binary Huff Curves
- ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem
- Elliptic curve implementation of zero-knowledge blobs
- An efficient dynamic authenticated key exchange protocol with selectable identities
- Algebraic curves and cryptography
- Pairings in Trusted Computing
- Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem
- Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles
- Elliptic curve cryptography: the serpentine course of a paradigm shift
- A round-optimal three-party ID-based authenticated key agreement protocol
- Optimal pairing computation over families of pairing-friendly elliptic curves
- A strong provably secure IBE scheme without bilinear map
- Efficient algorithms for Koblitz curves over fields of characteristic three
- Multi-designated verifiers signatures: anonymity without encryption
- Title not available (Why is that?)
- How to construct efficient signcryption schemes on elliptic curves
- Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
- Improved Pollard rho method for computing discrete logarithms over finite extension fields
- The generalized Weil pairing and the discrete logarithm problem on elliptic curves
- The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences
- A note on cyclic groups, finite fields, and the discrete logarithm problem
- Efficient encodings to hyperelliptic curves over finite fields
- Provably secure non-interactive key distribution based on pairings
- A threshold signature scheme based on the elliptic curve cryptosystem
- New identity-based society oriented signature schemes from pairings on elliptic curves
- On the embedding degree of reductions of an elliptic curve
- Index calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem
- Guest editorial: Special issue in honor of Scott A. Vanstone
- A review on the isomorphism classes of hyperelliptic curves of genus 2 over finite fields admitting a Weierstrass point
- The \(\mathbb Q\)-curve construction for endomorphism-accelerated elliptic curves
- A taxonomy of pairing-friendly elliptic curves
- Computation of discrete logarithms in prime fields
- Weakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptography
This page was built for publication: Reducing elliptic curve logarithms to logarithms in a finite field
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4307376)