A Note on Subgroup Security in Discrete Logarithm-Based Cryptography

被引:0
|
作者
Teruya, Tadanori [1 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Cyber Phys Secur Res Ctr, Tokyo 1350064, Japan
关键词
discrete logarithm-based cryptography; ElGamal encryption; membership check; pairing-based cryptography; subgroup security; ELLIPTIC CURVE CRYPTOGRAPHY; PUBLIC-KEY CRYPTOSYSTEM; ONE ROUND PROTOCOL; OPTIMIZED VERSIONS; SIGNATURES; ATE; IMPLEMENTATION; ENDOMORPHISMS; ENCRYPTION; XTR;
D O I
10.1587/transfun.2020CIP0019
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The membership check of a group is an important operation to implement discrete logarithm-based cryptography in practice securely. Since this check requires costly scalar multiplication or exponentiation operation, several efficient methods have been investigated. In the case of pairing-based cryptography, this is an extended research area of discrete logarithm-based cryptography, Barreto et al. (LATINCRYPT 2015) proposed a parameter choice called subgroup-secure elliptic curves. They also claimed that, in some schemes, if an elliptic curve is subgroup-secure, costly scalar multiplication or exponentiation operation can be omitted from the membership check of bilinear groups, which results in faster schemes than the original ones. They also noticed that some schemes would not maintain security with this omission. However, they did not show the explicit condition of what schemes become insecure with the omission. In this paper, we show a concrete example of insecurity in the sense of subgroup security to help developers understand what subgroup security is and what properties are preserved. In our conclusion, we recommend that the developers use the original membership check because it is a general and straightforward method to implement schemes securely. If the developers want to use the subgroup-secure elliptic curves and to omit the costly operation in a scheme for performance reasons, it is critical to carefully analyze again that correctness and security are preserved with the omission.
引用
收藏
页码:104 / 120
页数:17
相关论文
共 50 条
  • [21] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
  • [22] A note on quantum security for post-quantum cryptography
    Song, Fang
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
  • [23] Cryptography, connections, cocycles and crystals: A p-adic exploration of the discrete logarithm problem
    Gadiyar, HG
    Maini, KMS
    Padma, R
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 305 - 314
  • [24] A logarithm-based image denoising method for a mixture of Gaussian white noise and signal dependent noise
    Wang, Xinjian
    Chen, Guangyi
    Luo, Guangchun
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2017, 33 (01) : 281 - 291
  • [25] Natural Logarithm-Based Sliding Mode Control for Two DOF Active Engine Mounting System
    Andika, A. W.
    Fadly, J. D.
    Wahyudi
    Akmehawati, R.
    ICICI-BME: 2009 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, COMMUNICATION, INFORMATION TECHNOLOGY, AND BIOMEDICAL ENGINEERING, 2009, : 128 - +
  • [26] New logarithm-based discrimination formula for differentiating thalassemia trait from iron deficiency anemia in pregnancy
    Xiao Shuang
    Wang Zhenming
    Mei Zhu
    Sun Si
    Li Zuo
    BMC Pregnancy and Childbirth, 23
  • [27] New logarithm-based discrimination formula for differentiating thalassemia trait from iron deficiency anemia in pregnancy
    Shuang, Xiao
    Wang, Zhenming
    Zhu, Mei
    Si, Sun
    Zuo, Li
    BMC PREGNANCY AND CHILDBIRTH, 2023, 23 (01)
  • [28] Attack to multisignature schemes based on discrete logarithm
    Han, Xiao-Xi
    Wang, Gui-Lin
    Bao, Feng
    Ren, Kui
    Jisuanji Xuebao/Chinese Journal of Computers, 2004, 27 (08): : 1147 - 1152
  • [29] On Discrete Logarithm Based Additively Homomorphic Encryption
    Seo, Jae Hong
    Emura, Keita
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (11) : 2286 - 2289
  • [30] An Efficient Group Signatures Based on Discrete Logarithm
    Xia, Mingping
    Sun, Xue
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND INFORMATION SYSTEMS, 2009, : 50 - 53