Computing small discrete logarithms using optimized lookup tables

نویسنده

  • Vasilios Mavroudis
چکیده

In our previous work Crux , we used an additively homomorphic elliptic-curve cryptosystem, based on El Gamal, to compute privacy-preserving statistics for the Tor network [4]. The decryption algorithm of our cryptographic scheme required the computation of a small discrete logarithm (DL). For small values, the computation of the DLP should have been trivial as an exhaustive search would quickly retrieve the correct result. However, in our case the discrete logarithms ended up being quite large and an exhaustive search proved to be quite slow for reallife applications. In this work, we investigate an alternative approach, which uses an optimized lookup table of precomputed discrete logarithms. More specifically, we use a non-exhaustive lookup table to assist and speed up the computation of the small discrete logarithms. Similar approaches have been also been considered in the past [5], [3], [2]. Initially, we examine the related work in the field, we then outline our method, and finally we experimentally evaluate its performance. Based on our findings, we provide a python implementation, which we also incorporate in Crux.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fast Update of Forwarding Tables in Internet Router Using AS Numbers

The updates of router forwarding tables can be made faster using the Autonomous System number corresponding to a prefix as an intermediate number between the prefix and the next-hop address. At the cost of fast update, one table lookup introduces small additional delay, which can be eliminated by pipelining. This scheme is applicable to several routing table lookup algorithms for fast update.

متن کامل

Decompositions of graphs of functions and fast iterations of lookup tables

We show that every function f implemented as a lookup table can be implemented such that the computational complexity of evaluating fm(x) is small, independently of m and x. The implementation only increases the storage space by a small constant factor. © 2006 Elsevier B.V. All rights reserved.

متن کامل

Routing tradeoffs in dynamic peer-to-peer networks

Distributed Hash Tables (DHTs) are useful tools for building large scale distributed systems. DHTs provide a hash-table-like interface to applications by routing a key to its responsible node among the current set of participating nodes. DHT deployments are characterized by churn, a continuous process of nodes joining and leaving the network. Lookup latency is important to applications that use...

متن کامل

Finding the Position of a Subarray in a Pseudo-random Array

position-finding, pseudo-random arrays, discrete logarithms Pseudo-random arrays have the property that each possible subarray of a certain size except the all zero one occurs exactly once in the array. They are the two-dimensional analogue of pseudo-random sequences. These sequences are used in a number of position-finding applications, and pseudo-random arrays could also be useful in such app...

متن کامل

Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields

Since 2013 there have been several developments in algorithms for computing discrete logarithms in small-characteristic finite fields, culminating in a quasipolynomial algorithm. In this paper, we report on our successful computation of discrete logarithms in the cryptographically-interesting characteristic-three finite field F36·509 using these new algorithms; prior to 2013, it was believed th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015