2009
DOI: 10.1587/transfun.e92.a.182
|View full text |Cite
|
Sign up to set email alerts
|

Scalar Multiplication Using Frobenius Expansion over Twisted Elliptic Curve for Ate Pairing Based Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
4
2
2

Relationship

4
4

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…Of course, if the exponent is a public information such as the final exponentiation of pairing, there is no problem to apply binary method and thus a lot of improvements of final exponentiations, especially for the cases with BN curve, have been proposed based on binary method [12]. Moreover, it is known that a vector exponentiation and also scalar multiplication defined over extension field are drastically improved by using Frobenius mapping [29]; however, this paper simply applies binary method for the final exponentiation.…”
Section: Binary Methods and Montgomery Powering Laddermentioning
confidence: 99%
“…Of course, if the exponent is a public information such as the final exponentiation of pairing, there is no problem to apply binary method and thus a lot of improvements of final exponentiations, especially for the cases with BN curve, have been proposed based on binary method [12]. Moreover, it is known that a vector exponentiation and also scalar multiplication defined over extension field are drastically improved by using Frobenius mapping [29]; however, this paper simply applies binary method for the final exponentiation.…”
Section: Binary Methods and Montgomery Powering Laddermentioning
confidence: 99%
“…On the other hand, in case of using type-3 pairings, the anonymity proof cannot be proved due to the lack of the homomorphism. In this paper, we modify the previous scheme 10) to have the provable anonymity without the homomorphism, and implemented the modified scheme using an efficient type-3 pairing 16), 19) . We implemented the authentication system by extending EAP-TTLS 29) in the IEEE802.1X protocol such that it can use the group signature as the digital certificate of the client.…”
Section: Our Contributionsmentioning
confidence: 99%
“…This pairing library gives the fast pairing called "Cross-twisted χ-based Ate (Xt-Xate) pairing" with subfield-twisted curve 18), 19) . The number of iterations of Miller's algorithm for the Xt-Xate pairing is about one-quarter of the plain Tate pairing.…”
Section: Utilized Pairing Librarymentioning
confidence: 99%
“…where ∈ F p is a primitive cubic root of unity such that = z (p−1)/3 . On the other hand, according to Galbraith et al [6] and Nogami et al [12], an arbitrary rational point Q (x Q , y Q ) ∈ G 2 satisfies the following relation.…”
Section: Other Operationsmentioning
confidence: 99%