2005
DOI: 10.1007/s10623-004-3808-4
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic Curves Suitable for Pairing Based Cryptography

Abstract: For pairing based cryptography we need elliptic curves defined over finite fields F q whose group order is divisible by some prime with | q k − 1 where k is relatively small. In Barreto et al. and Dupont et al. Building curves with arbitrary small Mov degree over finite fields, Preprint, 2002], algorithms for the construction of ordinary elliptic curves over prime fields F p with arbitrary embedding degree k are given. Unfortunately, p is of size O( 2 ).We give a method to generate ordinary elliptic curves ov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
139
1
1

Year Published

2005
2005
2010
2010

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 136 publications
(143 citation statements)
references
References 13 publications
0
139
1
1
Order By: Relevance
“…Algebraic methods may produce curves with ρ closer to unity for certain values of k. Such techniques include the families of curves described by Barreto, Lynn, and Scott [3], and by Brezing and Weng [8]. The latter presents the best known results, achieving ρ ∼ 5/4 for families of curves with k = 8 or k = 24, and ρ ∼ (k + 2)/(k − 1) for prime k (hence ρ 5/4 for prime k 13).…”
Section: Introductionmentioning
confidence: 99%
“…Algebraic methods may produce curves with ρ closer to unity for certain values of k. Such techniques include the families of curves described by Barreto, Lynn, and Scott [3], and by Brezing and Weng [8]. The latter presents the best known results, achieving ρ ∼ 5/4 for families of curves with k = 8 or k = 24, and ρ ∼ (k + 2)/(k − 1) for prime k (hence ρ 5/4 for prime k 13).…”
Section: Introductionmentioning
confidence: 99%
“…The first wave of this research exhausted many tricks that can be applied inside a Miller iteration, resulting in significant computational speed ups [4,6,7,34]. The second wave of improvements focussed on constructing pairingfriendly elliptic curves [5,11,37,16,8,22,9,17,28], and this research is extended and collected in [18]. The third and more recent wave of research has focussed on reducing the loop length of Miller's algorithm [35,26,3,32] to be as short as possible [42,25].…”
Section: Introductionmentioning
confidence: 99%
“…For later analysis, we recall Koblitz's table about different security levels [15]. In this section, following Brezing and Weng's method [7], we generate the Ate pairing-friendly curves with k = 3 i .…”
Section: Matching Aes Security Using Public Key Systemsmentioning
confidence: 99%
“…Much work has been done on related topics, including an denominator elimination method [3], the selection of pairing-friendly groups [6], the construction of pairingfriendly curves [4] [7][8] [10] [19], the methods to shorten the Miller loop [2][9] [14] and etc.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation