机构:
Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R ChinaShanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
Gu Haihua
[1
]
Gu Dawu
论文数: 0引用数: 0
h-index: 0
机构:
Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R ChinaShanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
Gu Dawu
[1
]
机构:
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
来源:
CHINESE JOURNAL OF ELECTRONICS
|
2009年
/
18卷
/
04期
关键词:
Public key cryptosystems;
Discrete logarithm problem;
GHS attack;
Hyperelliptic curves;
WEIL DESCENT;
D O I:
暂无
中图分类号:
TM [电工技术];
TN [电子技术、通信技术];
学科分类号:
0808 ;
0809 ;
摘要:
The security of elliptic curve cryptosystems is based on the intractability of the discrete logarithm problem. The GHS attack provides a way of attacking elliptic curve discrete logarithm problem. Galbraith et al. extended the GHS attack to a much larger class of elliptic curves. In this paper, we apply Galbraith et al.'s idea to the GHS attack of hyperelliptic curves over non-prime fields of characteristic not two. The idea is that we first construct an efficiently-computable homomorphism and then map the hyperelliptic curve to a new hyperelliptic curve. Hence the discrete logarithm problem can be transformed into a discrete logarithm problem on a new hyperelliptic curve for which the generalized GHS attack is potential effective.