Improved exponentiation and key agreement in the infrastructure of a real quadratic field

  • Authors:
  • Vanessa Dixon;Michael J. Jacobson;Renate Scheidler

  • Affiliations:
  • Department of Computer Science, University of Calgary, Calgary, Alberta, Canada;Department of Computer Science, University of Calgary, Calgary, Alberta, Canada;Department of Computer Science, University of Calgary, Calgary, Alberta, Canada

  • Venue:
  • LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

We describe improvements to the performance of a key agreement protocol based in the infrastructure of a real quadratic field through investigating fast methods for exponentiating ideals. We present adaptations of non-adjacent form and signed base-3 exponentiation and compare these to the binary method. To adapt these methods, we introduce new algorithms for squaring, cubing, and dividing w-near (f,p) representations of ideals in the infrastructure. Numerical results from an implementation of the key agreement protocol using our new algorithms and all three exponentiation methods are presented, demonstrating that non-adjacent form exponentiation improves the speed of key establishment for most of the currently recommended security levels.