Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Building Curves with Arbitrary Small MOV Degree over Finite Prime Fields
Journal of Cryptology
Constructing elliptic curves with prescribed embedding degrees
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
IEEE Transactions on Information Theory
Provably secure non-interactive key distribution based on pairings
Discrete Applied Mathematics - Special issue: Coding and cryptography
Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y2 = x5 + ax
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
More Discriminants with the Brezing-Weng Method
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Another Approach to Pairing Computation in Edwards Coordinates
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Computing the Ate Pairing on Elliptic Curves with Embedding Degree k = 9
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Generating Pairing-Friendly Curves with the CM Equation of Degree 1
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Faster Pairings on Special Weierstrass Curves
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Provably secure non-interactive key distribution based on pairings
Discrete Applied Mathematics - Special issue: Coding and cryptography
Pairing-friendly elliptic curves with small security loss by Cheon's algorithm
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Constructing pairing-friendly elliptic curves using Gröbner basis reduction
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
IEEE Transactions on Information Theory
A new method for constructing pairing-friendly abelian surfaces
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Generating more Kawazoe-Takahashi genus 2 pairing-friendly hyperelliptic curves
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Constructing pairing-friendly elliptic curves with embedding degree 10
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
High security pairing-based cryptography revisited
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Faster pairing computations on curves with high-degree twists
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Avoiding full extension field arithmetic in pairing computations
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Pairing-Based cryptography at high security levels
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
On the efficient implementation of pairing-based protocols
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
On constructing families of pairing-friendly elliptic curves with variable discriminant
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
Ordinary abelian varieties having small embedding degree
Finite Fields and Their Applications
Algebraic curves and cryptography
Finite Fields and Their Applications
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Constructing pairing-friendly genus 2 curves with ordinary Jacobians
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Remarks on Cheon's algorithms for pairing-related problems
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
An improved twisted ate pairing over KSS curves with k=18
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Shorter IBE and signatures via asymmetric pairings
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Implementing pairings at the 192-bit security level
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Simple and exact formula for minimum loop length in Atei pairing based on Brezing---Weng curves
Designs, Codes and Cryptography
Speeding up ate pairing computation in affine coordinates
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Hi-index | 0.06 |
For pairing based cryptography we need elliptic curves defined over finite fields$$\mathbb{F}_{q}$$ whose group order is divisible by some prime$$\ell$$ with$$\ell | q^{k-1}$$ where k is relatively small. In Barreto et al. and Dupont et al. [Proceedings of the Third Workshop on Security in Communication Networks (SCN 2002), LNCS, 2576, 2003; Building curves with arbitrary small Mov degree over finite fields, Preprint, 2002], algorithms for the construction of ordinary elliptic curves over prime fields$$\mathbb{F}_{p}$$ with arbitrary embedding degree k are given. Unfortunately, p is of size$$O(\ell^{2})$$.We give a method to generate ordinary elliptic curves over prime fields with p significantly less than$$\ell^{2}$$ which also works for arbitrary k. For a fixed embedding degree k, the new algorithm yields curves with$$p \approx \ell^{s}$$ where$$s = 2 - 2/\varphi(k)$$ or$$s = 2 - 1/\varphi(k)$$ depending on k. For special values of k even better results are obtained.We present several examples. In particular, we found some curves where$$\ell$$ is a prime of small Hamming weight resp. with a small addition chain.