Some efficient algorithms for the final exponentiation of ηT pairing

被引:0
|
作者
Shirase, Masaaki [1 ]
Takagi, Tsuyoshi [1 ]
Okamoto, Eiji [2 ]
机构
[1] Future Univ, Hakodate, Hokkaido, Japan
[2] Univ Tsukuba, Tsukuba, Ibaraki, Japan
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS | 2007年 / 4464卷
关键词
tate pairing; eta(T) pairing; final exponentiation; torus;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently Tate pairing and its variations are attracted in cryptography. Their operations consist of a main iteration loop and a final exponentiation. The final exponentiation is necessary for generating a unique value of the bilinear pairing in the extension fields. The speed of the main loop has become fast by the recent improvements, e.g., the Duursma-Lee algorithm and eta(T) pairing. In this paper we discuss how to enhance the speed of the final exponentiation of the eta(T) pairing in the extension field F-36n. Indeed, we propose some efficient algorithms using the torus T-2(F-33n) that can efficiently compute an inversion and a powering by 3(n) + 1. Consequently, the total processing cost of computing the eta(T) pairing can be reduced by 16% for n = 97.
引用
收藏
页码:254 / +
页数:3
相关论文
共 50 条
  • [31] SOME EFFICIENT ALGORITHMS FOR DIGITAL FILTERING
    IVANAS, VI
    CYBERNETICS, 1985, 21 (06): : 783 - 788
  • [32] Comparative Power Analysis of Modular Exponentiation Algorithms
    Homma, Naofumi
    Miyamoto, Atsushi
    Aoki, Takafumi
    Satoh, Akashi
    Shamir, Adi
    IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (06) : 795 - 807
  • [33] Efficient software implementations of modular exponentiation
    Shay Gueron
    Journal of Cryptographic Engineering, 2012, 2 (1) : 31 - 43
  • [34] Efficient oblivious proofs of correct exponentiation
    Jakobsson, M
    Schnorr, CP
    SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 71 - 84
  • [35] Efficient parallel modular exponentiation algorithm
    Nedjah, N
    Mourelle, LD
    ADVANCES IN INFORMATION SYSTEMS, 2002, 2457 : 405 - 414
  • [36] Efficient primitives from exponentiation in ZP
    Jiang, Shaoquan
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 259 - 270
  • [37] Efficient pre-processing for large window-based modular exponentiation using genetic algorithms
    Nedjah, N
    Mourelle, LD
    DEVELOPMENTS IN APPLIED ARTIFICIAL INTELLIGENCE, 2003, 2718 : 625 - 635
  • [38] Efficient software implementations of modular exponentiation
    Gueron, Shay
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (01) : 31 - 43
  • [39] The importance of the final exponentiation in pairings when considering fault attacks
    Whelan, Claire
    Scott, Michael
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2007, 2007, 4575 : 225 - +
  • [40] Reduction optimal trinomials for efficient software implementation of the ηT pairing
    Nakajima, Toshiya
    Izu, Tetsuya
    Takagi, Tsuyoshi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 44 - +