Pairing-based cryptography at high security levels

被引:0
|
作者
Koblitz, N [1 ]
Menezes, A
机构
[1] Univ Washington, Dept Math, Seattle, WA 98195 USA
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solution by Boneh and Franklin [8] of the problem of efficient identity-based encryption. At the same time, the security standards for public key cryptosystems are expected to increase, so that in the future they will be capable of providing security equivalent to 128-, 192-, or 256-bit AES keys. In this paper we examine the implications of heightened security needs for pairing-based cryptosystems. We first describe three different reasons why high-security users might have concerns about the long-term viability of these systems. However, in our view none of the risks inherent in pairing-based systems are sufficiently serious to warrant pulling them from the shelves. We next discuss two families of elliptic curves E for use in pairing-based cryptosystems. The first has the property that the pairing takes values in the prime field F-p over which the curve is defined; the second family consists of supersingular curves with embedding degree k = 2. Finally, we examine the efficiency of the Weil pairing as opposed to the Tate pairing and compare a range of choices of embedding degree k, including k = 1 and k = 24.
引用
收藏
页码:13 / 36
页数:24
相关论文
共 50 条
  • [31] The Semi-Generic Group Model and Applications to Pairing-Based Cryptography
    Jager, Tibor
    Rupp, Andy
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 539 - +
  • [32] Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography
    Sakemi, Yumi
    Nogami, Yasuyuki
    Okeya, Katsuyuki
    Kato, Hidehiro
    Morikawa, Yoshitaka
    CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 226 - +
  • [33] An efficient implementation of pairing-based cryptography on MSP430 processor
    Jihoon Kwon
    Seog Chung Seo
    Seokhie Hong
    The Journal of Supercomputing, 2018, 74 : 1394 - 1417
  • [34] Constructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography
    Benger, Naomi
    Scott, Michael
    ARITHMETIC OF FINITE FIELDS, PROCEEDINGS, 2010, 6087 : 180 - 195
  • [35] Improving side-channel attacks against pairing-based cryptography
    Jauvart, Damien
    El Mrabet, Nadia
    Fournier, Jacques J. A.
    Goubin, Louis
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (01) : 1 - 16
  • [36] Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography
    El Mrabet, Nadia
    Fouotsa, Emmanuel
    CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 259 - 273
  • [37] Establishing Authenticated Pairwise Key using Pairing-based Cryptography for Sensor Networks
    Yang, Lijun
    Ding, Chao
    Wu, Meng
    2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, : 517 - 522
  • [38] Opcount: A Pseudo-Code Performance Estimation System for Pairing-Based Cryptography
    Abe, Masayuki
    Hoshino, Fumitaka
    Ohkubo, Miyako
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (09) : 1285 - 1292
  • [39] Tiny keys hold big secrets: On efficiency of Pairing-Based Cryptography in IoT
    Perazzo, Pericle
    Vallati, Carlo
    INTERNET OF THINGS, 2025, 30
  • [40] Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor
    Jihoon Kwon
    Seog Chung Seo
    Seokhie Hong
    The Journal of Supercomputing, 2018, 74 : 2254 - 2254