Parallel algorithms for modular multi-exponentiation

被引:16
作者
Borges, Fabio [1 ,2 ]
Lara, Pedro [2 ]
Portugal, Renato [2 ]
机构
[1] Tech Univ Darmstadt, D-64289 Darmstadt, Germany
[2] Lab Nacl Comp Cient, BR-25651075 Petropolis, Brazil
关键词
Modular exponentiation; Modular multi-exponentiation; Parallelization; Algorithms; Cryptography;
D O I
10.1016/j.amc.2016.07.036
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Modular exponentiation is a time-consuming operation widely used in cryptography. Modular multi-exponentiation, a generalization of modular exponentiation also used in cryptography, deserves further analysis from the algorithmic point of view. The parallelization of modular multi-exponentiation can be obtained by generalizing methods used to parallelize modular exponentiation. In this paper, we present a new parallelization method for the modular multi-exponentiation operation with two optimizations. The first one searches for the fastest solution without taking into account the number of processors. The second one balances the load among the processors and finds the smallest number of processors that achieves the fastest solution. In detail, our algorithms compute the product of i modular exponentiations. They split up each exponent in j blocks and start j threads. Each thread processes together i blocks from different exponents. Thus, each block of an exponent is processed in a different thread, but the blocks of different exponents are processed together in the same thread. Using addition chains, we show the minimum number of threads with load balance and optimal running time. Therefore, the algorithms are optimized to run with the minimum time and the minimum number of processors. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:406 / 416
页数:11
相关论文
共 17 条
[1]  
[Anonymous], 2001, TECHNICAL REPORT
[2]   EPPP4SMS: Efficient Privacy-Preserving Protocol for Smart Metering Systems and Its Simulation Using Real-World Data [J].
Borges, Fabio ;
Muehlhaueser, Max .
IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (06) :2701-2708
[3]   Parallel computation of the multi-exponentiation for cryptosystems [J].
Chang, CC ;
Lou, DC .
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1997, 63 (1-2) :9-26
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[6]  
Jin X, 2009, INT CONF ELECTRO INF, P1
[7]   Parallel modular exponentiation using load balancing without precomputation [J].
Lara, Pedro ;
Borges, Fabio ;
Portugal, Renato ;
Nedjah, Nadia .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (02) :575-582
[8]   An efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniques [J].
Lou, Der-Chyuan ;
Lai, Jui-Chang ;
Wu, Chia-Long ;
Chang, Te-Jen .
APPLIED MATHEMATICS AND COMPUTATION, 2007, 185 (01) :31-44
[9]  
Möller B, 2008, LECT NOTES COMPUT SC, V5229, P39, DOI 10.1007/978-3-540-85855-3_4
[10]  
Ottoy G, 2013, LECT NOTES COMPUT SC, V7806, P115, DOI 10.1007/978-3-642-36812-7_11