scispace - formally typeset
Book ChapterDOI

Some improved algorithms for hyperelliptic curve cryptosystems using degenerate divisors

Reads0
Chats0
TLDR
This paper presents explicit formulae of the addition algorithm with degenerate divisors, and develops a window-based scheme that is secure against side-channel attacks.
Abstract
Hyperelliptic curve cryptosystems (HECC) can be good alternatives to elliptic curve cryptosystems, and there is a good possibility to improve the efficiency of HECC due to its flexible algebraic structure. Recently, an efficient scalar multiplication technique for application to genus 2 curves using a degenerate divisor has been proposed. This new technique can be used in the cryptographic protocol using a fixed base point, e.g., HEC-DSA. This paper considers two important issues concerning degenerate divisors. First, we extend the technique for genus 2 curves to genus 3 curves. Jacobian variety for genus 3 curves has two different degenerate divisors: degree 1 and 2. We present explicit formulae of the addition algorithm with degenerate divisors, and then present the timing of scalar multiplication using the proposed formulae. Second, we propose several window methods using the degenerate divisors. It is not obvious how to construct a base point D such that degD = deg(aD) <g for integer a, where g is the genus of the underlying curve and deg(D) is the degree of divisor D. We present an explicit algorithm for generating such divisors. We then develop a window-based scheme that is secure against side-channel attacks.

read more

Citations
More filters
Journal ArticleDOI

Efficient pairing computation on supersingular Abelian varieties

TL;DR: A general technique for the efficient computation of pairings on Jacobians of supersingular curves is presented, which is called the eta pairing, and which leads to a new algorithm which is about twice as fast as the Duursma–Lee method.
Posted Content

Efficient Pairing Computation on Supersingular Abelian Varieties.

TL;DR: In this article, the eta pairing algorithm was proposed for supersingular Abelian varieties and was shown to be about twice as fast as the Duursma-Lee method.
Patent

Encryption processing apparatus, encryption processing method, and computer program

TL;DR: In this article, a common-key blockcipher processing configuration with enhanced immunity against attacks such as saturation attacks and algebraic attacks (XSL attacks) is realized, where S-boxes serving as non-linear transformation processing parts set in round-function executing parts are configured using at least two different types of s-boxes.
Book ChapterDOI

Efficient hyperelliptic arithmetic using balanced representation for divisors

TL;DR: In this article, the Jacobian of a hyperelliptic curve C of genus g was discussed and a different representation which is balanced at infinity was proposed. The resulting arithmetic is more efficient than previous approaches when there are two points at infinity.
Proceedings Article

Hyperelliptic pairings

TL;DR: It is indicated that hyperelliptic curves are not more efficient than elliptic curves for general pairing applications.
References
More filters
Book

Tata Lectures on Theta I

David Mumford
TL;DR: In this paper, theta functions in one variable and motivation: motivation and theta function in several variables are compared. But the results are limited to one variable, and motivation is not considered.
Book ChapterDOI

Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems

TL;DR: This paper generalizes DPA attack to elliptic curve (EC) cryptosystems and describes a DPA on EC Diffie-Hellman key exchange and EC EI-Gamal type encryption that enable to recover the private key stored inside the smart-card.
Book

Advances in Cryptology - CRYPTO 2002

Moti Yung
TL;DR: A new block cipher is defined, the BES, that uses only simple algebraic operations in GF (2) that can be regarded as being identical to the AES with a restricted message space and key space, thus enabling the AES to be realised solely using simple algebraics operations in one fieldGF (2).
Journal ArticleDOI

Hyperelliptic cryptosystems

TL;DR: A source of finite abelian groups suitable for cryptosystems based on the presumed intractability of the discrete logarithm problem for these groups are the jacobians of hyperelliptic curves defined over finite fields.
Related Papers (5)