Pairing-based cryptography at high security levels

被引:0
|
作者
Koblitz, N [1 ]
Menezes, A
机构
[1] Univ Washington, Dept Math, Seattle, WA 98195 USA
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solution by Boneh and Franklin [8] of the problem of efficient identity-based encryption. At the same time, the security standards for public key cryptosystems are expected to increase, so that in the future they will be capable of providing security equivalent to 128-, 192-, or 256-bit AES keys. In this paper we examine the implications of heightened security needs for pairing-based cryptosystems. We first describe three different reasons why high-security users might have concerns about the long-term viability of these systems. However, in our view none of the risks inherent in pairing-based systems are sufficiently serious to warrant pulling them from the shelves. We next discuss two families of elliptic curves E for use in pairing-based cryptosystems. The first has the property that the pairing takes values in the prime field F-p over which the curve is defined; the second family consists of supersingular curves with embedding degree k = 2. Finally, we examine the efficiency of the Weil pairing as opposed to the Tate pairing and compare a range of choices of embedding degree k, including k = 1 and k = 24.
引用
收藏
页码:13 / 36
页数:24
相关论文
共 50 条
  • [21] Pairing-Based Cryptography on the Internet of Things: A Feasibility Study
    Karantaidou, Ioanna
    Halkidis, Spyros T.
    Petridou, Sophia
    Mamatas, Lefteris
    Stephanides, George
    WIRED/WIRELESS INTERNET COMMUNICATIONS (WWIC 2018), 2018, 10866 : 219 - 230
  • [22] On the Security of Two Pairing-Based Signature Schemes
    Behnia, Rouzbeh
    Tan, Syh-Yuan
    Heng, Swee-Huay
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [23] Applications of Pairing-Based Cryptography on Automotive-Grade Microcontrollers
    Andreica, Tudor
    Groza, Bogdan
    Murvay, Pal-Stefan
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2018, 2018, 11094 : 331 - 343
  • [24] Securing Information Exchange in VANETs by Using Pairing-Based Cryptography
    Chen, Chin-Ling
    Shin, Jungpil
    Tsai, Yu-Ting
    Castiglione, Aniello
    Palmieri, Francesco
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (06) : 781 - 797
  • [25] A pairing-based cryptographic approach for data security in the cloud
    Miguel Morales-Sandoval
    Jose Luis Gonzalez-Compean
    Arturo Diaz-Perez
    Victor J. Sosa-Sosa
    International Journal of Information Security, 2018, 17 : 441 - 461
  • [26] Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices
    Hajny, Jan
    Dzurenda, Petr
    Ricci, Sara
    Malina, Lukas
    Vrba, Kamil
    2018 10TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT 2018): EMERGING TECHNOLOGIES FOR CONNECTED SOCIETY, 2018,
  • [27] An efficient implementation of pairing-based cryptography on MSP430 processor
    Kwon, Jihoon
    Seo, Seog Chung
    Hong, Seokhie
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (03): : 1394 - 1417
  • [28] Improving side-channel attacks against pairing-based cryptography
    Damien Jauvart
    Nadia El Mrabet
    Jacques J. A. Fournier
    Louis Goubin
    Journal of Cryptographic Engineering, 2020, 10 : 1 - 16
  • [29] On Constructing Prime Order Elliptic Curves Suitable for Pairing-Based Cryptography
    Zhang, Meng
    Chen, Xuehong
    Xu, Maozhi
    Wang, Jie
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 60 - 70
  • [30] A pairing-based cryptographic approach for data security in the cloud
    Morales-Sandoval, Miguel
    Luis Gonzalez-Compean, Jose
    Diaz-Perez, Arturo
    Sosa-Sosa, Victor J.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (04) : 441 - 461