On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus

被引:0
作者
Cheng, Chen-Mou [1 ]
Kodera, Kenta [1 ]
Miyaji, Atsuko [1 ]
机构
[1] Osaka Univ, Grad Sch Engn, Suita, Osaka, Japan
来源
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017 | 2018年 / 10779卷
基金
日本科学技术振兴机构;
关键词
Security evaluation; ECDLP; Index calculus; Summation polynomial; Point decomposition problem; DISCRETE LOGARITHM PROBLEM; ALGORITHMS;
D O I
10.1007/978-3-319-78556-1_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of elliptic curve cryptography is closely related to the computational complexity of the elliptic curve discrete logarithm problem (ECDLP). Today, the best practical attacks against ECDLP are exponential-time, generic discrete logarithm algorithms such as Pollard's rho method. Recently, there is a line of research on index calculus for ECDLP started by Semaev, Gaudry, and Diem. Under certain heuristic assumptions, such algorithms could lead to subexponential attacks to ECDLP in some cases. In this paper, we investigate the computational complexity of ECDLP for elliptic curves in various forms-including Hessian, Montgomery, (twisted) Edwards, and Weierstrass using index calculus. The research question we would like to answer is: Using index calculus, is there any significant difference in the computational complexity of ECDLP for elliptic curves in various forms? We will provide some empirical evidence and insights showing an affirmative answer in this paper.
引用
收藏
页码:245 / 263
页数:19
相关论文
共 16 条
[11]  
MONTGOMERY PL, 1987, MATH COMPUT, V48, P243, DOI 10.1090/S0025-5718-1987-0866113-7
[12]  
Petit C, 2012, IACR CRYPTOLOGY EPRI, V2012, P146
[13]   MONTE-CARLO METHODS FOR INDEX COMPUTATION (MOD P) [J].
POLLARD, JM .
MATHEMATICS OF COMPUTATION, 1978, 32 (143) :918-924
[14]  
Semaev I., 2004, IACR Cryptology ePrint Archive, V2004, P31
[15]  
Smart N. P., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P118
[16]  
Yun-Ju Huang, 2013, Advances in Information and Computer Security. 8th International Workshop on Security, IWSEC 2013. Proceedings: LNCS 8231, P115, DOI 10.1007/978-3-642-41383-4_8