Rethinking modular multi-exponentiation in real-world applications

被引:2
|
作者
Attias, Vidal [1 ]
Vigneri, Luigi [1 ]
Dimitrov, Vassil [2 ]
机构
[1] IOTA Fdn, Berlin, Germany
[2] Univ Calgary, Calgary, AB, Canada
关键词
Multi-exponentiation; OpenSSL; Benchmarking; Cryptography; Arithmetic; PARALLEL COMPUTATION; ALGORITHMS; COMPLEXITY;
D O I
10.1007/s13389-022-00287-w
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The importance of efficient multi-exponentiation algorithms in a large spectrum of cryptographic applications continues to grow. Previous literature on the subject pays attention exclusively on the minimization of the number of modular multiplications. However, a small reduction of the multiplicative complexity can be easily overshadowed by other figures of merit. In this article, we demonstrate that the most efficient algorithm for computing multi-exponentiation changes if considering execution time instead of number of multi-exponentiations. We focus our work on two algorithms that perform best under the number of multi-exponentiation metric and show that some side operations affect their theoretical ranking. We provide this analysis on different hardware, such as Intel Core and ARM CPUs and the two latest generations of Raspberry Pis, to show how the machine chosen affects the execution time of multi-exponentiation.
引用
收藏
页码:57 / 70
页数:14
相关论文
共 50 条
  • [1] Rethinking modular multi-exponentiation in real-world applications
    Vidal Attias
    Luigi Vigneri
    Vassil Dimitrov
    Journal of Cryptographic Engineering, 2023, 13 : 57 - 70
  • [2] Parallel algorithms for modular multi-exponentiation
    Borges, Fabio
    Lara, Pedro
    Portugal, Renato
    APPLIED MATHEMATICS AND COMPUTATION, 2017, 292 : 406 - 416
  • [3] Fast modular multi-exponentiation using modified complex arithmetic
    Wu, Chia-Long
    Lou, Der-Chyuan
    Lai, Jui-Chang
    Chang, Te-Jen
    APPLIED MATHEMATICS AND COMPUTATION, 2007, 186 (02) : 1065 - 1074
  • [4] An efficient divide-and-conquer technique for parallel computation of modular multi-exponentiation
    Lou, DC
    Chang, CC
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2000, 15 (02): : 111 - 117
  • [5] Parallel computation of the multi-exponentiation for cryptosystems
    Chang, CC
    Lou, DC
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1997, 63 (1-2) : 9 - 26
  • [6] Accelerating Oblivious Transfer with Batch Multi-exponentiation
    Sun, Yang
    Wu, Qianhong
    Liu, Jingwen
    Liu, Jianwei
    Huang, Xinyi
    Qin, Bo
    Hu, Wei
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 310 - 326
  • [7] A note on asynchronous multi-exponentiation algorithm using binary representation
    Sun, Da-Zhi
    Huai, Jin-Peng
    Li, Jian-Xin
    INFORMATION PROCESSING LETTERS, 2012, 112 (22) : 876 - 879
  • [8] Combination in Advance Batch Multi-exponentiation on Elliptic Curve
    Tao, Rui
    Liu, Jianwei
    Su, Hang
    Sun, Yang
    Liu, Xiao
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 411 - 416
  • [9] ANALYSIS OF COMPLEMENTS IN MULTI-EXPONENTIATION ALGORITHMS USING SIGNED DIGIT REPRESENTATIONS
    Heuberger, Clemens
    Prodinger, Helmut
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2009, 20 (03) : 443 - 453
  • [10] Batch Public Key Cryptosystem with batch multi-exponentiation
    Wu, Qianhong
    Sun, Yang
    Qin, Bo
    Hu, Jiankun
    Liu, Weiran
    Liu, Jianwei
    Ding, Yong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 196 - 204