Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings

نویسندگان

چکیده

We propose a novel approach that generalizes interleaved modular multiplication algorithms for the computation of sums products over large prime fields. This operation has widespread use and is at core many cryptographic applications. The method reformulates widely used lazy reduction technique, crucially avoiding need storage “double-precision” operations. Moreover, it can be easily adapted to different methods exist compute multiplication, producing are significantly more efficient memory-friendly. showcase performance proposed in an extension field Fpk , demonstrate its impact with record-breaking implementations bilinear pairings. Specifically, we accomplish full optimal ate pairing popular BLS12-381 curve, designed 128-bit security level, under half millisecond on 3.2GHz Intel Coffee Lake processor, which about 1.40× faster than state-of-the-art. Similarly, perform same BLS24-509 targeting 192-bit ~ 2.6 milliseconds, achieving speedup 1.30x. also report significant other applications, including protocols based supersingular isogenies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient algorithms for secure outsourcing of bilinear pairings

The computation of bilinear pairings has been considered the most expensive operation in pairing-based cryptographic protocols. In this paper, we first propose an efficient and secure outsourcing algorithm for bilinear pairings in the two untrusted program model. Compared with the state-of-the-art algorithm, a distinguishing Preprint submitted to Theoretical Computer Science 18 April 2014 prope...

متن کامل

Efficient Certificateless Signcryption from Bilinear Pairings

Certificateless public key cryptography is an attractive paradigm which combines advantages of both traditional certificate-based and ID-based public key cryptosystems. In this paper, the author formalizes the definition and the security model for certificateless signcryption (CLSC), and proposes a CLSC scheme that is proved to be secure in the random oracle model. The CLSC scheme satisfies suc...

متن کامل

New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings

Outsourcing paradigm has become a hot research topic in the cryptography community, where computation workloads can be outsourced to cloud servers by the resource-constrained devices, such as RFID tags. The computation of bilinear pairings is the most expensive operation in pairing-based cryptographic primitives. In this paper, we present two new algorithms for secure outsourcing the computatio...

متن کامل

A Note on "Efficient Algorithms for Secure Outsourcing of Bilinear Pairings"

We show that the verifying equations in the scheme [Theoretical Computer Science, 562 (2015), 112-121] cannot filter out some malformed values returned by the malicious servers. We also remark that the two untrusted programs model adopted in the scheme is somewhat artificial, and discuss some reasonable scenarios for outsourcing computations.

متن کامل

Efficient Proxy Signature Scheme for Mobile Devices Using Bilinear Pairings

A proxy signature scheme is useful and convenient because it allows a proxy signer to sign a message on behalf of an entity. This study proposes a novel efficient proxy signature scheme for mobile devices using bilinear pairings. The computational cost of the proposed signature scheme is extremely low, and the length of the proposed signature is limited. In addition, our scheme does not require...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems

سال: 2023

ISSN: ['2569-2925']

DOI: https://doi.org/10.46586/tches.v2023.i3.445-472