An algorithm for modular exponentiation
Information Processing Letters
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
An Improved Algorithm for Arithmetic on a Family of Elliptic Curves
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Theory and applications for a double-base number system
ARITH '97 Proceedings of the 13th Symposium on Computer Arithmetic (ARITH '97)
Short Signatures from the Weil Pairing
Journal of Cryptology
Improved algorithms for efficient arithmetic on elliptic curves using fast endomorphisms
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A Tree-Based Approach for Computing Double-Base Chains
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
A graph theoretic analysis of double base number systems
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Extending scalar multiplication using double bases
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Scalar multiplication on koblitz curves using double bases
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Extended double-base number system with applications to elliptic curve cryptography
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
FPGA implementation of point multiplication on koblitz curves using kleinian integers
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Efficient scalar multiplication by isogeny decompositions
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
ISC'07 Proceedings of the 10th international conference on Information Security
A new algorithm for computing triple-base number system
ACM SIGARCH Computer Architecture News
Hi-index | 0.00 |
In this paper we produce a practical and efficient algorithm to find a decomposition of type $$ n= \sum\limits^{k}_{i=1} 2{^s_i}3{^t_{i}}, s_{i},t_{i} \in {\mathbb N}\cup{\{0\}} with k \leq (c+o(1))\frac{log n}{log log n}.$$ It is conjectured that one can take c = 2 above. Then this decomposition is refined into an effective scalar multiplication algorithm to compute nP on some supersingular elliptic curves of characteristic 3 with running time bounded by $$O\left(\frac{log n}{log log n}\right)$$ and essentially no storage. To our knowledge, this is the first instance of a scalar multiplication algorithm that requires o(log n) curve operations on an elliptic curve over ${\mathbb F}_{q}$with log q≈ log n and uses comparable storage as in the standard double-and-add algorithm. This leads to an efficient algorithm very useful for cryptographic protocols based on supersingular curves. This is for example the case of the well-studied (in the past four years) identity based schemes. The method carries over to any supersingular curve of fixed characteristic.