The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

Scaling Security of Elliptic Curves with Fast Pairing Using Efficient Endomorphisms

Katsuyuki TAKASHIMA

  • Full Text Views

    0

  • Cite this

Summary :

Cryptosystems using pairing computation on elliptic curves have various applications including ID-based encryption ([19],[29],[30] etc.). Scott [33] proposed a scaling method of security by a change of the embedding degree k. On the other hand, he also presented an efficient pairing computation method on an ordinary (non-supersingular) elliptic curve over a large prime field Fp ([34]). In this paper, we present an implementation method of the pairing computation with both of the security scaling in [33] and the efficiency in [34]. First, we will investigate the mathematical nature of the set of the paremeter r (the order of cyclic group used) so as to support many k's. Then, based on it, we will suggest some modification to the algorithm of Scott in [34] to achieve flexible scalability of security level.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E90-A No.1 pp.152-159
Publication Date
2007/01/01
Publicized
Online ISSN
1745-1337
DOI
10.1093/ietfec/e90-a.1.152
Type of Manuscript
Special Section PAPER (Special Section on Cryptography and Information Security)
Category
Elliptic Curve Cryptography

Authors

Keyword