2018
DOI: 10.21608/joems.2018.2540.1008
|View full text |Cite
|
Sign up to set email alerts
|

Speeding Up Multi- Exponentiation Algorithm on a Multicore System

Abstract: A public key cryptosystem is a basic tool to protect data security. Most public key cryptosystem schemes include time consuming operations such as the modular multi exponentiation. To address this problem, a new parallel algorithm for the modular multi exponentiation is introduced. The proposed algorithm is based on parallelizing the binary method. The experimental study on a multicore system shows that the running time of the proposed algorithm is smaller than the previous parallel algorithm in the cases of l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…The increase in the values of two parameters leads to a slight increase in the running time. (4) The running time for SAAS algorithm is faster than the exact algorithm, and the difference between the two algorithms in running time increases with increase in e and k. (5) The last column of Table 2 shows the percentage improvement for the SAAS algorithm compared to the exact algorithm.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The increase in the values of two parameters leads to a slight increase in the running time. (4) The running time for SAAS algorithm is faster than the exact algorithm, and the difference between the two algorithms in running time increases with increase in e and k. (5) The last column of Table 2 shows the percentage improvement for the SAAS algorithm compared to the exact algorithm.…”
Section: Resultsmentioning
confidence: 99%
“…The first reason is that one of the fundamental operations that play an important role in the efficiency of many public key cryptosystems and protocols is group exponentiation (sometimes it is called multi-modular exponentiation [2,5]), i.e., computing 𝑔 ,𝑔 ,…,𝑔 simultaneously with a minimal number of operations, where g is an element in a group. Designing a fast algorithm for generating a shortest (or short) ASeq increases the efficiency of such public key cryptosystems and protocols since evaluating 𝑔 ,𝑔 ,…,𝑔 with a minimal number of multiplications is equivalent to finding a shortest ASeq(N).…”
Section: Introductionmentioning
confidence: 99%
“…The complexity of the integer factorization issue affects the security of several public key cryptosystems such as [11,20,23,25,36], while the exponentiation problem determines the effectiveness of such cryptosystems [9,10,34].…”
Section: Introductionmentioning
confidence: 99%
“…Many problems in number theory and computer arithmetic play important roles in cryptography. Examples of such problems are the generation of prime numbers [1][2][3], primality testing [4,5], modular exponentiation [6], addition chains and sequences [7,8] and integer factorization [9][10][11][12]. Developing fast algorithms that address these problems is one of the main challenges of algorithm complexity and leads to significant improvements in various applications.…”
Section: Introductionmentioning
confidence: 99%