Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10



Similar documents
Constructing Elliptic Curves with Prescribed Embedding Degrees

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

A One Round Protocol for Tripartite

High-Speed Software Implementation of the Optimal Ate Pairing over Barreto Naehrig Curves

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves

Implementation of Elliptic Curve Digital Signature Algorithm

Identity-Based Encryption from the Weil Pairing

EMBEDDING DEGREE OF HYPERELLIPTIC CURVES WITH COMPLEX MULTIPLICATION

Faster Pairing Computation

Lecture 25: Pairing-Based Cryptography

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, Notes on Algebra

An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC

Elements of Applied Cryptography Public key encryption

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

A new probabilistic public key algorithm based on elliptic logarithms

An Overview of Integer Factoring Algorithms. The Problem

How To Prove The Dirichlet Unit Theorem

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and

minimal polyonomial Example

Elliptic Curve Cryptography

Efficient Unlinkable Secret Handshakes for Anonymous Communications

Ideal Class Group and Units

A Factoring and Discrete Logarithm based Cryptosystem

An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood

THE ADVANTAGES OF ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SECURITY KRISTIN LAUTER, MICROSOFT CORPORATION

A SOFTWARE COMPARISON OF RSA AND ECC

CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY

The Mathematics of the RSA Public-Key Cryptosystem

RSA Attacks. By Abdulaziz Alrasheed and Fatima

Square root computation over even extension fields

Implementation and Adaptation of the Pseudonymous PKI for Ubiquitous Computing for Car-2-Car Communication

Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University

An Approach to Shorten Digital Signature Length

ALGEBRAIC APPROACH TO COMPOSITE INTEGER FACTORIZATION

AN END-TO-END IDENTITY-BASED ENCRYPTION SCHEME

MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction

Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)

Study of algorithms for factoring integers and computing discrete logarithms

A blind digital signature scheme using elliptic curve digital signature algorithm

A New and Efficient Signature on Commitment Values

Lecture 13 - Basic Number Theory.

Notes on Network Security Prof. Hemant K. Soni

A New Generic Digital Signature Algorithm

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

7. Some irreducible polynomials

Cryptography and Network Security Chapter 10

Arithmetic algorithms for cryptology 5 October 2015, Paris. Sieves. Razvan Barbulescu CNRS and IMJ-PRG. R. Barbulescu Sieves 0 / 28

New Efficient Searchable Encryption Schemes from Bilinear Pairings

Implementing Network Security Protocols

Experiments in Encrypted and Searchable Network Audit Logs

ECE 842 Report Implementation of Elliptic Curve Cryptography

Efficient Software Implementation of Public-Key Cryptography on Sensor Networks Using the MSP430X Microcontroller

CIS 5371 Cryptography. 8. Encryption --

Identity Based Encryption. Terence Spies VP Engineering

Discrete Mathematics, Chapter 4: Number Theory and Cryptography

Short Programs for functions on Curves

Lecture 17: Re-encryption

Groups in Cryptography

Overview of Public-Key Cryptography

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing

Computer Security: Principles and Practice

Cryptography and Network Security

ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS

Factorization Algorithms for Polynomials over Finite Fields

Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2)

Signature Schemes. CSG 252 Fall Riccardo Pucella

Factorization Methods: Very Quick Overview

How To Ensure Data Integrity In Clouds

M-Pin: A Multi-Factor Zero Knowledge Authentication Protocol

RSA Question 2. Bob thinks that p and q are primes but p isn t. Then, Bob thinks Φ Bob :=(p-1)(q-1) = φ(n). Is this true?

Digital Signature. Raj Jain. Washington University in St. Louis

SEC 2: Recommended Elliptic Curve Domain Parameters

An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography

Introduction to Finite Fields (cont.)

LUC: A New Public Key System

Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings

New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings

FACTORING. n = fall in the arithmetic sequence

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM

Transcription:

with Embedding Degree 10 University of California, Berkeley, USA ANTS-VII, 2006

Outline 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3

Outline 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3

Let E be an elliptic curve defined over a finite field F q. For any integer r the Weil pairing e r is a bilinear map sending pairs of points with order r to r-th roots of unity in F q : e r : E[r] E[r] µ r. These pairings can been used in many cryptographic constructions, including: one-round, 3-way key agreement (Joux); short signature schemes (Boneh, Lynn, Shacham); identity-based encryption (Boneh, Franklin); and many others.

Making Pairings Practical For pairing-based cryptosystems to be practical and secure, we require: the discrete logarithm in the order-r subgroup of E(F q ) to be computationally infeasible; the discrete logarithm in µ r to be computationally infeasible; the pairing to be easily computable (i.e. µ r lies in a low-degree extension of F q ). To optimize applications, we want to choose a curve E so that the two discrete log problems are of about equal difficulty.

Outline 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3

Embedding Degrees Let E be an elliptic curve over F q with #E(F q ) = r. Let k be the smallest integer such that µ r F q k (i.e. r q k 1). Bal., Kob.: E[r] E(F q k ), so the Weil pairing embeds E(F q ) into F. q k k is the embedding degree of E (with respect to r). Note: k is the order of q in (Z/rZ). For random curves, k r q.

The Problem The problem: find primes q and elliptic curves E/F q of prime order r with small embedding degree (k 30). Want to be able to control the number of bits of q to construct curves for various applications. Could also look for curves E with nearly prime order #E(F q ) = large prime r small cofactor. Requirement that E(F q ) has prime order is what makes the problem difficult. Cocks, Pinch: Constructed E with arbitrary embedding degree k, but largest prime factor of #E(F q ) q.

Previous Results Menezes, Okamoto, Vanstone, 1993 (MOV): Showed that supersingular elliptic curves always have embedding degree k 6. Miyaji, Nakabayashi, Takano, 2001 (MNT): Gave complete characterization of ordinary elliptic curves of prime order with embedding degree k = 3, 4, 6. Barreto, Naehrig, 2005: Constructed a family of elliptic curves of prime order and embedding degree 12.

The Main Result D.F., 2006: Constructed elliptic curves of prime order with embedding degree 10. Solves open problem posed by Boneh, Lynn, Shacham, 2001.

Outline The CM Method: The Basic Construction The CM Method: Generating Families of Curves 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3

The CM Method: The Basic Construction The CM Method: Generating Families of Curves The CM Method of Curve Construction Main tool: Complex Multiplication method of curve construction (Atkin, Morain). For given D > 0, constructs elliptic curve with CM by Q( D). Constructs curves with specified number of points. Running time roughly O(D). How it works: Fix D, k. Look for t, n, q (representing trace, number of points, and size of field) satisfying 1 q, n prime; 2 n = q + 1 t (formula for number of points); 3 n divides q k 1 (embedding degree k); 4 Dy 2 = 4q t 2 for some integer y. For such t, n, q, if D is not too large ( 10 9 ) we can construct an elliptic curve E over F q with n points and embedding degree k.

Outline The CM Method: The Basic Construction The CM Method: Generating Families of Curves 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3

Observations about the CM Method The CM Method: The Basic Construction The CM Method: Generating Families of Curves Barreto, Lynn, Scott: The embedding degree condition n q k 1 can be replaced with n Φ k (t 1), where Φ k is the k-th cyclotomic polynomial. k smallest such that n q k 1 implies n Φ k (q). q + 1 t = n implies q = t 1 (mod n). Barreto, Naehrig: Parametrize t, n, q as polynomials: t(x), n(x), q(x). Construct curves by finding integer solutions to Dy 2 = 4q(x) t(x) 2 = 4n(x) (t(x) 2) 2.

Extending the CM Method The CM Method: The Basic Construction The CM Method: Generating Families of Curves Combine these observations to get an algorithm for generating families of pairing-friendly curves: 1 Fix D, k, and choose a polynomial t(x). 2 Choose n(x) an irreducible factor of Φ k (t(x) 1). 3 Find integer solutions (x, y) to Dy 2 = 4n(x) (t(x) 2) 2. 4 If q(x), n(x) are both prime, construct elliptic curve over F q(x) with n(x) points. Step 3 is the difficult part: if f (x) = 4n(x) (t(x) 2) 2 has degree 3, then Dy 2 = f (x) (usually) has only a finite number of integer solutions! (Siegel s Theorem)

Outline 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3

Embedding Degree 10: The Key Observation Goal: Choose t(x), choose n(x) an irreducible factor of Φ 10 (t(x) 1), such that 4n(x) (t(x) 2) 2 is quadratic. Φ 10 (x) = x 4 x 3 + x 2 x + 1 degree 4. All irred. factors of Φ 10 (t(x) 1) must have 4 degree. Key observation: Need to choose n(x), t(x) such that the leading terms of 4n and t 2 cancel out. Smallest possible case: deg n = 4, deg t = 2. Galbraith, McKee, Valença: Characterized quadratic t(x) such that Φ 10 (t(x) 1) factors into two quartics. One of these t(x) gives the desired cancellation!

Choice of Parameters Choose t, n, q as follows: t(x) = 10x 2 + 5x + 3 n(x) = 25x 4 + 25x 3 + 15x 2 + 5x + 1 q(x) = 25x 4 + 25x 3 + 25x 2 + 10x + 3 Then n(x) divides Φ 10 (t(x) 1), and f (x) = 4n(x) (t(x) 2) 2 = 15x 2 + 10x + 3.

Constructing the Curves To find curves: set D = 15D, u = 15x + 5, complete the square in Dy 2 = 15x 2 + 10x + 3 to get u 2 D y 2 = 20. Find integer solutions (u, y) to this Pell-like equation. (Use LMM algorithm.) Let x = (u 5)/15. If q(x) and n(x) are prime, there exists an elliptic curve with embedding degree 10! If no solutions of appropriate size, or q(x) or n(x) not prime, increase D and try again.

Outline 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3

General Results (Thanks to Mike Scott) Searched for curves with D < 2 10 9, q between 148 and 512 bits. Crypto applications: want q 220-250 bits (discrete log in E(F q ) about as difficult as discrete log in F q 10). Found 23 curves of prime order with embedding degree 10. Found 101 curves of nearly prime order (large prime small cofactor < 2 16 ) and embedding degree 10. Ability to handle larger D in CM Method would allow us to find more curves.

Example: A 234-bit Curve (Computed by Mike Scott) Set D = 1227652867. Compute solution (x, y) to Dy 2 = 15x 2 + 10x + 3. Use this value of x to compute t = 269901098952705059670276196260897153 n = 18211650803969472064493264347375949776033155743952030750450033782306651 q = 18211650803969472064493264347375950045934254696657090420726230043203803 Use CM method to compute curve equation over F q : (Given t, n, q, curve equation took about a week to compute.) y 2 = x 3 3x+15748668094913401184777964473522859086900831274922948973320684995903275. This curve has n points and embedding degree 10!

Appendix References Selected References I P.S.L.M. Barreto, M. Lynn, M. Scott, Constructing elliptic curves with prescribed embedding degrees, SCN 2002. P.S.L.M. Barreto, M. Naehrig, Pairing-friendly elliptic curves of prime order, SAC 2005. I. Blake, G. Seroussi, N. Smart, Elliptic Curves in Cryptography and Advances in Elliptic Curve Cryptography, LMS Lecture Notes, 1999 & 2005. S. Galbraith, J. McKee, P. Valença, Ordinary abelian varieties having small embedding degree, Proc. WS Math. Problems and Techniques in Crypto., 2005.

Appendix References Selected References II A. Menezes, T. Okamoto, S. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Trans. Info. Theory, 1993. A Miyaji, M. Nakabayashi, S. Takano, Reducing elliptic curve logarithms to logarithms in a finite field, IEICE Trans. Fundamaentals, 2001. F. Morain, Building cyclic elliptic curves modulo large primes, EUROCRYPT 1991.