Computing small discrete logarithms using optimized lookup tables
نویسنده
چکیده
In our previous work Crux , we used an additively homomorphic elliptic-curve cryptosystem, based on El Gamal, to compute privacy-preserving statistics for the Tor network [4]. The decryption algorithm of our cryptographic scheme required the computation of a small discrete logarithm (DL). For small values, the computation of the DLP should have been trivial as an exhaustive search would quickly retrieve the correct result. However, in our case the discrete logarithms ended up being quite large and an exhaustive search proved to be quite slow for reallife applications. In this work, we investigate an alternative approach, which uses an optimized lookup table of precomputed discrete logarithms. More specifically, we use a non-exhaustive lookup table to assist and speed up the computation of the small discrete logarithms. Similar approaches have been also been considered in the past [5], [3], [2]. Initially, we examine the related work in the field, we then outline our method, and finally we experimentally evaluate its performance. Based on our findings, we provide a python implementation, which we also incorporate in Crux.
منابع مشابه
Fast Update of Forwarding Tables in Internet Router Using AS Numbers
The updates of router forwarding tables can be made faster using the Autonomous System number corresponding to a prefix as an intermediate number between the prefix and the next-hop address. At the cost of fast update, one table lookup introduces small additional delay, which can be eliminated by pipelining. This scheme is applicable to several routing table lookup algorithms for fast update.
متن کاملDecompositions of graphs of functions and fast iterations of lookup tables
We show that every function f implemented as a lookup table can be implemented such that the computational complexity of evaluating fm(x) is small, independently of m and x. The implementation only increases the storage space by a small constant factor. © 2006 Elsevier B.V. All rights reserved.
متن کاملRouting tradeoffs in dynamic peer-to-peer networks
Distributed Hash Tables (DHTs) are useful tools for building large scale distributed systems. DHTs provide a hash-table-like interface to applications by routing a key to its responsible node among the current set of participating nodes. DHT deployments are characterized by churn, a continuous process of nodes joining and leaving the network. Lookup latency is important to applications that use...
متن کاملFinding the Position of a Subarray in a Pseudo-random Array
position-finding, pseudo-random arrays, discrete logarithms Pseudo-random arrays have the property that each possible subarray of a certain size except the all zero one occurs exactly once in the array. They are the two-dimensional analogue of pseudo-random sequences. These sequences are used in a number of position-finding applications, and pseudo-random arrays could also be useful in such app...
متن کاملComputing discrete logarithms in cryptographically-interesting characteristic-three finite fields
Since 2013 there have been several developments in algorithms for computing discrete logarithms in small-characteristic finite fields, culminating in a quasipolynomial algorithm. In this paper, we report on our successful computation of discrete logarithms in the cryptographically-interesting characteristic-three finite field F36·509 using these new algorithms; prior to 2013, it was believed th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015