Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
スポンサーリンク
概要
- 論文の詳細を見る
The problem we consider in this paper is whether the Menezes-Okamoto-Vanstone (MOV) reduction for attacking elliptic curve cryptosystems can be realized for genera elliptic curves. In realizing the MOV reduction, the base field F_q is extended so that the reduction to the discrete logarithm problem in a finite field is possible. Recent results by Balasubramanian and Koblitz suggest that, if l ⫮q-1, such a minimum extension degree is the minimum k such that l∖q^k -1, which is equivalent to the condition under which the Frey-Ruck (FR) reduction can be applied, where l is the order of the group in the elliptic curve discrete logarithm problem. Our point is that the problem of finding an l-torsion point required in evaluating the Weil pairing should be considered as well from an algorithmic point of view. In this paper, we actually propose a method which leads to a solution of the problem. In addition, our contribution allows us to draw the conclusion that the MOV reduction is indeed as powerful as the FR reduction under l ⩘q -1 not only from the viewpoint of the minimum extension degrees but also from that of the effectiveness of algorithms.
- 社団法人電子情報通信学会の論文
- 2000-04-25
著者
-
Zheng Y
Univ. North Carolina Charlotte Nc Usa
-
Zheng Yuliang
Department Of Software And Information Systems
-
Shikata Junji
Graduate School Of Environment And Information Sciences Yokohama National University
-
IMAI Hideki
The author is with Institute of Industrial Sience, the University of Tokyo
-
Imai H
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An
-
Imai Hideki
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Shikata J
The Graduate School Of Environment And Information Sciences Yokohama National University
-
Shikata Junji
The Authors Are With The Institute Of Industrial Science The University Of Tokyo
-
ZHENG Yuliang
The author is with the School of Network Computing, Monash University
-
SUZUKI Joe
The authors are with the Graduate School of Science, Osaka University
-
Suzuki Joe
The Authors Are With The Department Of Mathematics Graduate School Of Science Osaka University
-
Suzuki Joe
The Authors Are With The Graduate School Of Science Osaka University
関連論文
- 非超特異楕円曲線に対するMOVアルゴリズムの実現(2)
- Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions
- On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- On Strictly Geometrically Uniform Codes: Construction and New Codes
- 情報量的安全性に基づく暗号化方式について
- Unconditionally Secure Group Signatures
- An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations : Special Section on Cryptography and Information Security
- A Novel Fast Correlation Attack Suitable for Simple Hardare Implementation
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability(Special Section on Cryptography and Information Security)
- A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures : Special Section on Cryptography and Information Security
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures
- A Traitor Traceable Conference System with Dynamic Sender(Special Section on Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Improving the Secure Electronic Transaction Protocol by Using Signcryption
- Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks : Special Section on Cryptography and Information Security
- An Optimization of Credit-Based Payment for Electronic Toll Collection Systems
- Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
- Deforestation and Degradation of Natural Resources in Ethiopia : Forest Management Implications from a Case Study in the Belete-Gera Forest
- Traceability Schemes against Illegal Distribution of Signed Documents(Discrete Mathematics and Its Applications)
- Hierarchical Coding Based on Multilevel Bit-Interleaved Channeles
- The Role of Arbiters for Unconditionally Secure Authentication(Discrete Mathematics and Its Applications)
- Information-Theoretically Secure Key Insulated Encryption : Models, Bounds and Constructions(Cryptography and Information Security)(Information Theory and Its Applications)
- On Collusion Security of Random Codes(Biometrics)(Cryptography and Information Security)
- Collusion Secure Codes : Systematic Security Definitions and Their Relations(Discrete Mathematics and Its Applications)
- Modified Aggressive Mode of Internet Key Exchange Resistant against Denial-of-Service Attacks(Special Issue on Next Generation Internet Technologies and Their Applications)
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- A Fast Jacobian Group Arithmetic Scheme for Algebraic Curve Cryptography : Special Section on Cryptography and Information Security
- An Image Correction Scheme for Video Watermarking Extraction : Special Section on Cryptography and Information Security
- Development of Cryptology in the Nineties : Special Section on the 10th Anniversary of Trans. Fundamentals : Last Decade and 21st Century
- An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation