A Note on Subgroup Security in Discrete Logarithm-Based Cryptography

被引:0
|
作者
Teruya, Tadanori [1 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Cyber Phys Secur Res Ctr, Tokyo 1350064, Japan
关键词
discrete logarithm-based cryptography; ElGamal encryption; membership check; pairing-based cryptography; subgroup security; ELLIPTIC CURVE CRYPTOGRAPHY; PUBLIC-KEY CRYPTOSYSTEM; ONE ROUND PROTOCOL; OPTIMIZED VERSIONS; SIGNATURES; ATE; IMPLEMENTATION; ENDOMORPHISMS; ENCRYPTION; XTR;
D O I
10.1587/transfun.2020CIP0019
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The membership check of a group is an important operation to implement discrete logarithm-based cryptography in practice securely. Since this check requires costly scalar multiplication or exponentiation operation, several efficient methods have been investigated. In the case of pairing-based cryptography, this is an extended research area of discrete logarithm-based cryptography, Barreto et al. (LATINCRYPT 2015) proposed a parameter choice called subgroup-secure elliptic curves. They also claimed that, in some schemes, if an elliptic curve is subgroup-secure, costly scalar multiplication or exponentiation operation can be omitted from the membership check of bilinear groups, which results in faster schemes than the original ones. They also noticed that some schemes would not maintain security with this omission. However, they did not show the explicit condition of what schemes become insecure with the omission. In this paper, we show a concrete example of insecurity in the sense of subgroup security to help developers understand what subgroup security is and what properties are preserved. In our conclusion, we recommend that the developers use the original membership check because it is a general and straightforward method to implement schemes securely. If the developers want to use the subgroup-secure elliptic curves and to omit the costly operation in a scheme for performance reasons, it is critical to carefully analyze again that correctness and security are preserved with the omission.
引用
收藏
页码:104 / 120
页数:17
相关论文
共 50 条
  • [31] A BLIND SIGNATURE BASED ON DISCRETE LOGARITHM PROBLEM
    Shen, Victor R. L.
    Chung, Yu Fang
    Chen, Tzer Shyong
    Lin, Yu An
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (09): : 5403 - 5416
  • [32] Signature scheme based on composite discrete logarithm
    Tan, CH
    Yi, X
    Siew, CK
    ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, 2003, : 1702 - 1706
  • [33] Review of Security Methods Based on Classical Cryptography and Quantum Cryptography
    Subramani, Shalini
    Selvi, M.
    Kannan, A.
    Svn, Santhosh Kumar
    CYBERNETICS AND SYSTEMS, 2025, 56 (03) : 302 - 320
  • [34] AN ID-BASED CRYPTOSYSTEM BASED ON THE DISCRETE LOGARITHM PROBLEM
    TSUJII, S
    ITOH, T
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1989, 7 (04) : 467 - 473
  • [35] Security of Tzeng-Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems
    Hwang, SJ
    Liao, HC
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 717 - 721
  • [36] A new access control scheme based on discrete logarithm
    Chen, Z.
    Qi, M.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2001, 29 (03): : 57 - 59
  • [37] Additive Combinatorics and Discrete Logarithm Based Range Protocols
    Chaabouni, Rafik
    Lipmaa, Helger
    Shelat, Abhi
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 336 - +
  • [38] New digital signature scheme based on the discrete logarithm
    Inst. of Communication Networks Integrated Technique, Beijing Univ. of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    Xi'an Dianzi Keji Daxue Xuebao, 2008, 2 (351-355):
  • [39] NEW DIGITAL SIGNATURE SCHEME BASED ON DISCRETE LOGARITHM
    YEN, SM
    LAIH, CS
    ELECTRONICS LETTERS, 1993, 29 (12) : 1120 - 1121
  • [40] Design validations for Discrete Logarithm based signature schemes
    Brickell, E
    Pointcheval, D
    Vaudenay, S
    Yung, M
    PUBLIC KEY CRYTOGRAPHY, 2000, 1751 : 276 - 292