Skip to main content

On Constructing Prime Order Elliptic Curves Suitable for Pairing-Based Cryptography

  • Conference paper
  • First Online:
  • 3297 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1156))

Abstract

Since Boneh and Franklin implemented the Identity Based Encryption in 2001, a number of novel schemes have been proposed based on bilinear pairings, which have been widely used in the scenario of blockchain. The elliptic curves with low embedding degree and large prime-order subgroup (a.k.a pairing-friendly elliptic curves) are the basic components for such schemes, where prime order elliptic curves are most frequently used in practice. In this paper, a systematic method is utilized to find all the possible prime order families, then it is shown that all the existing constructions can be explained via our method. We further give the evidence that it’s unlikely to produce extra families.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: Symposium on Cryptography and Information Security, pp. 135–148 (2000)

    Google Scholar 

  2. Joux, A.: A one round protocol for tripartite Diffie-Hellman. J. Cryptol. 17(4), 385–393 (2004)

    Article  MathSciNet  Google Scholar 

  3. Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. In: International Cryptology Conference on Advances in Cryptology, pp. 213–229. Springer (2001)

    Google Scholar 

  4. GM/T 0044.1-2016 Identity-based cryptographic algorithms SM9

    Google Scholar 

  5. Freeman, D., Scott, M., Teske, E.: A taxonomy of pairing-friendly elliptic curves. J. Cryptol. 23(2), 224–280 (2010)

    Article  MathSciNet  Google Scholar 

  6. Le, D.P., Mrabet, N.E., Tan, C.H.: On near prime-order elliptic curves with small embedding degrees. In: Algebraic Informatics, pp. 140–151. Springer (2015)

    Google Scholar 

  7. Lee, H.S., Lee, P.R.: Families of pairing-friendly elliptic curves from a polynomial modification of the Dupont-Enge-Morain method. Appl. Math. Inf. Sci. 10(2), 571–580 (2016). https://doi.org/10.18576/amis/100218

    Article  Google Scholar 

  8. Okano, K.: Note on families of pairing-friendly elliptic curves with small embedding degree. JSIAM Lett. 61–64 (2016). https://doi.org/10.14495/jsiaml.8.61

  9. Li, L.: Generating pairing-friendly elliptic curves with fixed embedding degrees. Sci. China Inf. Sci. 60(11), 119101 (2017). https://doi.org/10.1007/s11432-016-0412-0

    Article  MathSciNet  Google Scholar 

  10. Urroz, J.J., Shparlinski, I.E.: On the number of isogeny classes of pairing-friendly elliptic curves and statistics of MNT curves. Math. Comput. 81(278), 1093–1110 (2012)

    Article  MathSciNet  Google Scholar 

  11. Zhang, M., Hu, Z., Xu, M.: On constructing parameterized families of pairing-friendly elliptic curves with \(\rho =1\). In: Chen, K., Lin, D., Yung, M. (eds.) Inscrypt 2016. LNCS, vol. 10143, pp. 403–415. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-54705-3_25

    Chapter  Google Scholar 

  12. Zhang, M., Xu, M.: Generating pairing-friendly elliptic curves using parameterized families. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101(1), 279–282 (2018)

    Article  MathSciNet  Google Scholar 

  13. Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve traces for FR-reductions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 84(5), 1234–1243 (2001)

    MATH  Google Scholar 

Download references

Acknowledgments

The authors would like to thank the anonymous reviewers for insightful comments and helpful suggestions. Meng Zhang, Maozhi Xu and Jie Wang were partially supported by the National Key R&D Program of China, 2017YFB0802000 and Natural Science Foundation of China, 61672059. Xuehong Chen was partially supported by the National Key R&D Program of China, 2018YFB2100400.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meng Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, M., Chen, X., Xu, M., Wang, J. (2020). On Constructing Prime Order Elliptic Curves Suitable for Pairing-Based Cryptography. In: Zheng, Z., Dai, HN., Tang, M., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2019. Communications in Computer and Information Science, vol 1156. Springer, Singapore. https://doi.org/10.1007/978-981-15-2777-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-2777-7_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-2776-0

  • Online ISBN: 978-981-15-2777-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics