Parallel Computation of Optimal Ate Cryptographic Pairings at the 128, 192 and 256-bit security levels using elliptic net algorithm

03/25/2020
by   Narcisse Bang Mbang, et al.
0

Efficient computations of pairings with Miller Algorithm have recently received a great attention due to the many applications in cryptography. In this work, we give formulae for the optimal Ate pairing in terms of elliptic nets associated to twisted Barreto-Naehrig (BN) curve, Barreto-Lynn-Scott(BLS) curves and Kachisa-Schaefer-Scott(KSS) curves considered at the 128, 192 and 256-bit security levels, and Scott-Guillevic curve with embedding degree 54. We show how to parallelize the computation of these pairings when the elliptic net algorithm instead is used and we obtain except in the case of Kachisa-Schaefer-Scott(KSS) curves considered at the 256-bit security level, more efficient theoretical results with 8 processors compared to the case where the Miller algorithm is used. This work still confirms that BLS48 curves are the best for pairing-based cryptography at 256-bit security level <cit.>.

READ FULL TEXT
research
04/27/2023

On the Discrete Logarithm Problem for elliptic curves over local fields

The Discrete Logarithm Problem (DLP) for elliptic curves has been extens...
research
09/15/2021

The Elliptic Net Algorithm Revisited

Pairings have been widely used since their introduction to cryptography....
research
02/27/2019

Efficient and Secure ECDSA Algorithm and its Applications: A Survey

Public-key cryptography algorithms, especially elliptic curve cryptograp...
research
07/22/2020

Set It and Forget It! Turnkey ECC for Instant Integration

Historically, Elliptic Curve Cryptography (ECC) is an active field of ap...
research
09/25/2021

Implementing ECC on Data Link Layer of the OSI Reference Model

The Internet, a rapidly expanding communication infrastructure, poses si...
research
12/04/2022

Pairing-Friendly Elliptic Curves: Revisited Taxonomy, Attacks and Security Concern

Major families of pairing-friendly elliptic curves, including BN, BLS12,...
research
11/11/2017

Mathematics of Isogeny Based Cryptography

These lectures notes were written for a summer school on Mathematics for...

Please sign up or login with your details

Forgot password? Click here to reset