This paper presents an implementation of genus 2 and 3 hyperelliptic curves over prime fields, with a comparison with elliptic curves. To achieve a fair comparison, we developed an ad-hoc arithmetic library, designed to remove most of the... more
Authenticated key agreement protocols have an important role for building secure communications amongst two or more entities over the Internet. In this paper we propose an efficient and secure authenticated key agreement protocol based on... more
on which the proxy signer can sign. Also, proxy signature schemes can be classified as proxy-unprotected and proxy-protected schemes. In an proxy-protected scheme, the original signer cannot forge a proxy signature in the name of the... more
A new definition of bitopological space is introduce in this paper with its - open set -open function , and inductively -open function and on some theorems for its.
Pairing-based cryptosystems have been developing very fast in the last few years. The efficiencies of the cryptosystems are determined by the computation of the Tate pairing. In this paper a new efficient algorithm based on double-base... more
We consider algebraic affine and projective curves of Edwards over the finite field F p n . It is known that many modern cryptosystems can be naturally transformed into elliptic curves . We research Edwards algebraic curves over a finite... more
Proxy signature schemes have been invented to delegate signing rights. The paper proposes a new concept of Identify Based Strong Bi-Designated Verifier threshold proxy signature (ID-SBDVTPS) schemes. Such scheme enables an original signer... more
We present a general technique for the efficient computation of pairings on supersingular Abelian varieties. This formulation, which we call the eta pairing, generalises results of Duursma and Lee for computing the Tate pairing on... more
This paper proposes an asymmetric physical layer security scheme APLE based on Elliptic curve Diffie Helman (ECDH), channel state information (CSI), and stream cipher to achieve user authenticity, key agreement and confidentiality.... more
For corporations or individuals who wish to protect the confidentiality of their data across computer networks, network-layer encryption offers an efficient and proven method for preserving data privacy. Network layer encryption such as... more
For corporations or individuals who wish to protect the confidentiality of their data across computer networks, network-layer encryption offers an efficient and proven method for preserving data privacy. Network layer encryption such as... more
Elliptic curves with small embedding degree and large prime-order subgroup are key ingredients for implementing pairingbased cryptographic systems. Such "pairing-friendly" curves are rare and thus require specific constructions. In this... more
When using pairing-friendly ordinary elliptic curves over prime fields to implement identity-based protocols, there is often a need to hash identities to points on one or both of the two elliptic curve groups of prime order r involved in... more
When performing a Tate pairing (or a derivative thereof) on an ordinary pairing-friendly elliptic curve, the computation can be looked at as having two stages, the Miller loop and the so-called final exponentiation. As a result of good... more
One of the challenges in the designing of pairing-based cryptographic protocols is to construct suitable pairing-friendly curves: Curves which would provide efficient implementation without compromising the security of the protocols.... more
In this paper we show an efficient implementation of the Tate, ate and Rate pairings in magma. This will be demonstrated by using the KSS curves with embedding degree k = 18.
A Publicly Verifiable Secret Sharing (PVSS) scheme allows anyone to verify the validity of the shares computed and distributed by a dealer. The idea of PVSS was introduced by Stadler in [18] where he presented a PVSS scheme based on... more
For the implementation of error-correcting codes, cryptographic algorithms, and the construction of homomorphic methods for privacy-preserving, there is a need for methods of performing operations on elements GF(2m) that have low... more
We introduce enough group theory and number theory to analyze in detail certain problems in cryptology. In the course of our investigations we comment on the importance of finding efficient algorithms for real world applications. The... more
CiteSeerX - Document Details (Isaac Councill, Lee Giles): durchgeführt unter der Leitung von.
We call a pair of distinct prime powers (q 1 , q 2) = (p a1 1 , p a2 2) a Hasse pair if | √ q 1 − √ q 2 | ≤ 1. For such pairs, we study the relation between the set E 1 of isomorphism classes of elliptic curves defined over F q1 with q 2... more
We introduce a set of four twisted Edwards curves that satisfy common security requirements and allow for fast implementations of scalar multiplication on 8, 16, and 32-bit processors. Our curves are defined by an equation of the form −x... more
nontrivial divisor for a large number. In 2009, the number RSA-768 was factorized in 2009 within the RSA-competition that was already closed. Specified 768-bit number (232 decimal digits) is currently the largest number, known from public... more
We describe, in detail sufficient for easy implementation, a fast method for calculation of the Tate pairing, as required for pairingbased cryptographic protocols. We point out various optimisations and tricks, and compare timings of a... more
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In particular, our techniques improve pairing evaluation speed by a factor of about 55 compared to previously known methods in characteristic 3,... more
In this paper we describe how to efficiently implement pairing calculation on supersingular genus 2 curves over prime fields. We find that, contrary to the results reported in [8], pairing calculation on supersingular genus 2 curves over... more
We describe, in detail sufficient for easy implementation, a fast method for calculation of the Tate pairing, as required for pairingbased cryptographic protocols. We point out various optimisations and tricks, and compare timings of a... more
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In particular, our techniques improve pairing evaluation speed by a factor of about 55 compared to previously known methods in characteristic 3,... more
When using pairing-friendly ordinary elliptic curves over prime fields to implement identity-based protocols, there is often a need to hash identities to points on one or both of the two elliptic curve groups of prime order r involved in... more
When performing a Tate pairing (or a derivative thereof) on an ordinary pairing-friendly elliptic curve, the computation can be looked at as having two stages, the Miller loop and the so-called final exponentiation. As a result of good... more
Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment in new security applications, particularly in the context of implementations of Identity-Based Encryption (IBE). In this paper we describe the... more
Pairing-based cryptosystems rely on the existence of bilinear, nondegenerate, efficiently computable maps (called pairings) over certain groups. Currently, all such pairings used in practice are related to the Tate pairing on elliptic... more
Elliptic curves with small embedding degree and large prime-order subgroup are key ingredients for implementing pairing-based cryptographic systems. Such "pairing-friendly" curves are rare and thus require specific constructions. In this... more
Tate pairing based cryptosystems have recently emerged as an alternative to traditional public key cryptosystems, because of their ability to be used in multi-party identity-based key management schemes. Due to the inherent parallelism of... more
After Miller's original algorithm for the Tate pairing computation, many improved algorithms have been suggested, to name just a few, by Galbraith et al. and Barreto et al., especially for the flelds with characteristic three. Also... more
Let f ∈ Q[x] be a square-free polynomial of degree ≥ 3 and m ≥ 3 be an odd positive integer. Based on our earlier investigations we prove that there exists a function D 1 ∈ Q(u, v, w) such that the Jacobians of the curves C 1 : D 1 y 2 =... more
We show that for any pair of elliptic curves E 1 , E 2 over ޑ with jinvariant equal to 0, we can find a polynomial D ∈ [ޚu, v] such that the cubic twists of the curves E 1 , E 2 by D(u, v) have positive rank over (ޑu, v). We also... more
In this paper a system of coordinates for the effective divisors on the Jacobian Variety of a Picard curve is presented. These coordinates possess a nice geometric interpretation and provide us with an unifying environment to obtain an... more
Blind signature allows one user to get a signature without giving the signer any information about the actual message or the resulting signature. In this paper, we aim to improve the recently proposed Lin et al.'s Self-certified Partially... more
Let S be a rational fraction and let f be a polynomial over a finite field. Consider the transform T (f) = numerator(f (S)). In certain cases, the polynomials f , T (f), T (T (f)). .. are all irreducible. For instance, in odd... more
In the recent years, lattice modelling proved to be a topic of renewed interest. Indeed, fields as distant as chemical modelling and biological tissue modelling use network models that appeal to similar equilibrium laws. In both cases,... more
In MANET environment, the nodes are mobile i.e., nodes move in and out dynamically. This causes difficulty in maintaining a central trusted authority say Certification Authority CA or Key Generation Centre KCG. In addition most of... more
In this paper, we present several improvements on the best known explicit formulae for hyperelliptic curves of genus three and four in characteristic two, including the issue of reducing memory requirements. To show the effectiveness of... more
Broadcast encryption (BE) deals with secure transmission of a message to a group of receivers such that only an authorized subset of receivers can decrypt the message. The transmission cost of a BE system can be reduced considerably if a... more
We prove the Hasse-Weil inequality for genus 2 curves given by an equation of the form y 2 = f (x) with f a polynomial of degree 5, using arguments that mimic the elementary proof of the genus 1 case obtained by Yu. I. Manin in 1956.
Given a polynomial f with coefficients in a field of prime characteristic p, it is known that there exists a differential operator that raises 1/f to its pth power. We first discuss a relation between the 'level' of this differential... more
We provide an easy method for the construction of characteristic polynomials of simple ordinary abelian varieties A of dimension g over a finite field Fq, when q ≥ 4 and 2g = ρ b−1 (ρ − 1) for some prime ρ ≥ 5, with b ≥ 1. Moreover, we... more
In this paper, we present two efficient algorithms computing scalar multiplications of a point in an elliptic curve defined over a small finite field, the Frobenius map of which has small trace. Both methods use the identity which... more