2019
DOI: 10.1145/3313880.3313884
|View full text |Cite
|
Sign up to set email alerts
|

Hashing to G2 on BLS pairing-friendly curves

Abstract: When a pairing e : G 1 × G 2 → G T , on an elliptic curve E defined over F q , is exploited in a cryptographic protocol, there is often the need to hash binary strings into G 1 and G 2. Traditionally, if E admits a twistẼ of order d, then G 1 = E(F q)∩E[r], where r is a prime integer, and G 2 =Ẽ(F q k/d)∩Ẽ[r], where k is the embedding degree of E w.r.t. r. The standard approach for hashing a binary string into G 1 and G 2 is to map it to general points P ∈ E(F q) and P ∈Ẽ(F q k/d), and then multiply them by th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 12 publications
(12 reference statements)
0
2
0
Order By: Relevance
“…Previous works [9,11] on hashing into 2 using the Scott et al's method with BLS curves, MNT curves, KSS curves, and Freeman curves provided some computational costs that we confront to the results obtained in this work. We consider the notations A for point addition, D for point doubling, X for a scalar multiplication by the parameter x and an application of the endomorphism (.).…”
Section: Comparison With Others Pairing-friendly Elliptic Curvesmentioning
confidence: 87%
See 1 more Smart Citation
“…Previous works [9,11] on hashing into 2 using the Scott et al's method with BLS curves, MNT curves, KSS curves, and Freeman curves provided some computational costs that we confront to the results obtained in this work. We consider the notations A for point addition, D for point doubling, X for a scalar multiplication by the parameter x and an application of the endomorphism (.).…”
Section: Comparison With Others Pairing-friendly Elliptic Curvesmentioning
confidence: 87%
“…Two methods are used for efficient hashing into 2 : the Scott et al's method [9] and Fuentes et al's method [10]. Those methods have been applied to BN curves and BLS curves [11] and other curves [9]. This work continues the same line of research in which we consider hashing into 2 on the newly constructed pairing-friendly curves introduced by Scott and Guillevic [12].…”
Section: Introductionmentioning
confidence: 86%