Skip to main content

Two efficient algorithms for arithmetic of elliptic curves using Frobenius map

  • Conference paper
  • First Online:
Public Key Cryptography (PKC 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1431))

Included in the following conference series:

Abstract

In this paper, we present two efficient algorithms computing scalar multiplications of a point in an elliptic curve defined over a small finite field, the Frobenius map of which has small trace. Both methods use the identity which expresses multiplication-by-m maps by polynomials of Frobenius maps. Both are applicable for a large family of elliptic curves and more efficient than any other methods applicable for the family. More precisely, by Algorithm 1(Frobenius k-ary method), we can compute mP in at most 2l/5 + 28 elliptic additions for arbitrary l bit integer m and a point P on some elliptic curves. For other curves, the number of elliptic additions required is less than l. Algorithm 2(window method) requires at average 2l/3 elliptic additions to compute mP for l bit integer m and a point P on a family of elliptic curves. For some ‘good’ elliptic curves, it requires 5l/12 + 11 elliptic additions at average.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Guajardo and C. Paar, “Efficient algorithms for elliptic curve cryptosystems”, Proc. Crypto '97, Springer-Verlag, 1997, pp. 342–356.

    Google Scholar 

  2. K. Koyama and Y. Tsuruoka, “Speeding up Elliptic Cryptosystems by using a singed binary window method”, Proc. Crypto '92, Springer-Verlag, 1993, pp. 43–56.

    Google Scholar 

  3. N. Koblitz, A Course in Number Theory and Cryptography, Springer-Verlag, 1991.

    Google Scholar 

  4. N. Koblitz, “CM curves with good cryptographic properties”, Proc. Crypto '91, Springer-Verlag, 1992, pp. 279–287.

    Google Scholar 

  5. N. Koblitz, “Hyperelliptic Cryptosystems”, Journal of Cryptology 1(1989), pp. 139–150.

    Article  MATH  MathSciNet  Google Scholar 

  6. W. Meier and O. Staffelbach, “Efficient multiplication on certain non-supersingular elliptic curves”, Proc. Crypto '92, Springer-Verlag, 1993, pp. 333–344.

    Google Scholar 

  7. A. Menezez, Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, 1993.

    Google Scholar 

  8. F. Morain and J. Olivos, “Speeding up the computations on an elliptic curve using additions-subtraction chains”, Inform. Theory. Appl. 24 (1990), pp.531–543.

    MathSciNet  Google Scholar 

  9. R. Schoof, “Elliptic curves over finite fields and the computation of square roots mod p”, Math. Comp. 44(1985), pp.483–494.

    Article  MATH  MathSciNet  Google Scholar 

  10. J. Silverman, The Arithmetic of Elliptic Curves, Springer-Verlag, 1992.

    Google Scholar 

  11. J. Solinas, “An improved algorithm for arithmetic on a family of elliptic curves”, Proc. Crypto '97, Springer-Verlag, 1997, pp. 357–371.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hideki Imai Yuliang Zheng

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cheon, J.H., Park, S., Park, S., Kim, D. (1998). Two efficient algorithms for arithmetic of elliptic curves using Frobenius map. In: Imai, H., Zheng, Y. (eds) Public Key Cryptography. PKC 1998. Lecture Notes in Computer Science, vol 1431. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0054025

Download citation

  • DOI: https://doi.org/10.1007/BFb0054025

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64693-8

  • Online ISBN: 978-3-540-69105-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics