Subgroup Security in Pairing-Based Cryptography

被引:28
作者
Barreto, Paulo S. L. M. [1 ]
Costello, Craig [2 ]
Misoczki, Rafael [1 ]
Naehrig, Michael [2 ]
Pereira, Geovandro C. C. F. [1 ]
Zanon, Gustavo [1 ]
机构
[1] Univ Sao Paulo, Escola Politecn, Sao Paulo, Brazil
[2] Microsoft Res, Redmond, WA 98052 USA
来源
PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015 | 2015年 / 9230卷
关键词
Pairing-based cryptography; Elliptic-curve cryptography; Pairing-friendly curves; Subgroup membership; Small-subgroup attacks; FRIENDLY ELLIPTIC-CURVES; EXPONENTIATION; IMPLEMENTATION;
D O I
10.1007/978-3-319-22174-8_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pairings are typically implemented using ordinary pairing-friendly elliptic curves. The two input groups of the pairing function are groups of elliptic curve points, while the target group lies in the multiplicative group of a large finite field. At moderate levels of security, at least two of the three pairing groups are necessarily proper subgroups of a much larger composite-order group, which makes pairing implementations potentially susceptible to small-subgroup attacks. To minimize the chances of such attacks, or the effort required to thwart them, we put forward a property for ordinary pairing-friendly curves called subgroup security. We point out that existing curves in the literature and in publicly available pairing libraries fail to achieve this notion, and propose a list of replacement curves that do offer subgroup security. These curves were chosen to drop into existing libraries with minimal code change, and to sustain state-of-the-art performance numbers. In fact, there are scenarios in which the replacement curves could facilitate faster implementations of protocols because they can remove the need for expensive group exponentiations that test subgroup membership.
引用
收藏
页码:245 / 265
页数:21
相关论文
共 54 条
  • [1] [Anonymous], 2013, 2013688 CRYPT EPRINT
  • [2] [Anonymous], IACR CRYPTOLOGY EPRI
  • [3] [Anonymous], 2000, S CRYPT INF SEC
  • [4] Aranha Diego F., 2012, Pairing-Based Cryptography - Pairing 2012. 5th International Conference. Revised Selected Papers, P177, DOI 10.1007/978-3-642-36334-4_11
  • [5] Aranha DF, 2011, LECT NOTES COMPUT SC, V6632, P48, DOI 10.1007/978-3-642-20465-4_5
  • [6] Barbulescu R, 2014, LECT NOTES COMPUT SC, V8441, P1, DOI 10.1007/978-3-642-55220-5_1
  • [7] Barreto PSLM, 2006, LECT NOTES COMPUT SC, V3897, P319
  • [8] Barreto PSLM, 2004, J CRYPTOL, V17, P321, DOI [10.1007/s00145-004-0311-z, 10.1007/s00I45-004-03U-z]
  • [9] Barreto PSLM, 2003, LECT NOTES COMPUT SC, V2576, P257
  • [10] Benger N, 2010, LECT NOTES COMPUT SC, V6087, P180, DOI 10.1007/978-3-642-13797-6_13