Skip to main content

Encapsulated Scalar Multiplications and Line Functions in the Computation of Tate Pairing

  • Conference paper
Theory and Applications of Models of Computation (TAMC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4484))

  • 1139 Accesses

Abstract

The efficient computation of the Tate pairing is a crucial factor to realize cryptographic applications practically. To compute the Tate pairing, two kinds of costs on the scalar multiplications and Miller’s line functions of elliptic curves should be considered. In the present paper, encapsulated scalar multiplications and line functions are discussed. Some simplified formulas and improved algorithms to compute f 3T , f 4T , f 2T±P , f 6T , f 3T±P and f 4T±P etc., are presented from given points T and P on the elliptic curve.

Supported by the NSF of China (10571005, 60473019), by 863 Project (No. 2006AA01Z434) and by NKBRPC (2004CB318000).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barreto, P.S.L.M., et al.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354–368. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  2. Barreto, P.S.L.M., Lynn, B., Scott, M.: On the selection of pairing-friendly groups. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 17–25. Springer, Heidelberg (2004)

    Google Scholar 

  3. Blake, I.F., Kumar Murty, V., Xu, G.: Refinements of Miller’s algorithm for computing the Weil/Tate pairing. J. Algorithms 58(2), 134–149 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  4. Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. SIAM Journal of Computing 32, 586–615 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  5. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Ciet, M., et al.: Trading inversions for multiplications in elliptic curve cryptography. Design, Codes and Cryptography 39(2), 189–206 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  7. Cohen, H., Miyaji, A., Ono, T.: Efficient elliptic curve exponentiation using mixed coordinates. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 51–65. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  8. Duquesne, S., Frey, G.: Background on pairings. In: Handbook of elliptic and hyperelliptic curve cryptography, Discrete Math. Appl., pp. 115–124. Chapman & Hall/CRC, Boca Raton (2006)

    Google Scholar 

  9. Duquesne, S., Frey, G.: Implementation of pairings. In: Handbook of elliptic and hyperelliptic curve cryptography, Discrete Math. Appl., pp. 389–404. Chapman & Hall/CRC, Boca Raton (2006)

    Google Scholar 

  10. Duquesne, S., Lange, T.: Pairing-based cryptography. In: Handbook of elliptic and hyperelliptic curve cryptography, Discrete Math. Appl., pp. 573–590. Chapman & Hall/CRC, Boca Raton (2006)

    Google Scholar 

  11. Dutta, R., Barua, R., Sarkar, P.: Pairing-based cryptography: a survey. Cryptology ePrint Archive, Report 2004/064 (2004)

    Google Scholar 

  12. Eisenträger, K., Lauter, K., Montgomery, P.L.: Fast elliptic curve arithmetic and improved Weil pairing evaluation. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 343–354. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  13. Galbraith, S., Harrison, K., Soldera, D.: Implementing the Tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 324–337. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  14. Galbraith, S.: Pairings. In: Advances in elliptic curve cryptography. London Math. Soc. Lecture Note Ser., vol. 317, pp. 183–213. Cambridge University Press, Cambridge (2005)

    Google Scholar 

  15. Granger, R., Page, D., Smart, N.: High security pairing-based cryptography revisited. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol. 4076, pp. 480–494. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  16. Hankerson, D., Menezesand, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)

    MATH  Google Scholar 

  17. Izu, T., Takagi, T.: Efficient computations of the Tate pairing for the large MOV degrees. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 283–297. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  18. Koblitz, N., Menezes, A.: Pairing-based cryptography at high security levels. Cryptology ePrint Archive, Report 2005/076 (2005)

    Google Scholar 

  19. Menezes, A.J.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Dordrecht (1993)

    MATH  Google Scholar 

  20. Miller, V.: Short programs for functions on curves. Unpublished manuscript (1986)

    Google Scholar 

  21. Miller, V.: The Weil pairing, and its efficient calculation. J. Cryptology 17(4), 235–261 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  22. Sakai, R., Ohgishiand, K., Kasahara, M.: Cryptosystems based on pairing. In: SCIS’00, no. C20 (2000)

    Google Scholar 

  23. Scott, M.: Computing the Tate pairing. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 293–304. Springer, Heidelberg (2005)

    Google Scholar 

  24. Scott, M., Costigan, N., Abdulwahab, W.: Implementing cryptographic pairings on smartcards. Cryptography ePrint Archive, Report 2006/144 (2006)

    Google Scholar 

  25. Silverman, J.H.: The Arithmetic of Elliptic Curves. GTM, vol. 106. Springer, Berlin (1986)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jin-Yi Cai S. Barry Cooper Hong Zhu

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Feng, R., Wu, H. (2007). Encapsulated Scalar Multiplications and Line Functions in the Computation of Tate Pairing. In: Cai, JY., Cooper, S.B., Zhu, H. (eds) Theory and Applications of Models of Computation. TAMC 2007. Lecture Notes in Computer Science, vol 4484. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72504-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72504-6_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72503-9

  • Online ISBN: 978-3-540-72504-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics