Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
On the security of generalized Jacobian cryptosystems - MaRDI portal

On the security of generalized Jacobian cryptosystems (Q2470818)

From MaRDI portal





scientific article
Language Label Description Also known as
English
On the security of generalized Jacobian cryptosystems
scientific article

    Statements

    On the security of generalized Jacobian cryptosystems (English)
    0 references
    0 references
    15 February 2008
    0 references
    Generalized Jacobians have been proposed as a setting for public-key cryptosystems by \textit{I. Déchène} [Lect. Notes Comput. Sci. 4076, 421--435 (2006; Zbl 1151.14312)], where arithmetic in the special case formed by extending the group of points on an elliptic curve over a finite field with a modulus consisting of the sum of two points on the curve is described. In this paper, the security of this type of generalized Jacobian is examined by considering the discrete logarithm problem in a subgroup \(\mathbb{F}_{q^r}^* \times \langle B \rangle,\) where \(B \in E(\mathbb{F}_q)\) has order \(l.\) The main result is that computing a discrete logarithm in this subgroup is polynomial-time equivalent to solving discrete logarithm problems in \(\mathbb{F}_{q^r}^*\) and \(E(\mathbb{F}_q),\) from which the author concludes that, although not optimal in terms of efficiency/security ratio, these types of generalized Jacobians are sufficiently secure for cryptographic purposes. In addition, the author shows that in order to compute discrete logarithms in \(\mathbb{F}_{q^r}^* \times \langle B \rangle,\) the discrete logarithm in \(\mathbb{F}_{q^r}^*\) and \(E(\mathbb{F}_q)\) may be computed separately in parallel in the case that \(l \nmid (q^r - 1),\) whereas in the case of pairing-friendly curves, for which \(l ~| ~ (q^r - 1),\) it is not known how to do this without completely solving the discrete logarithm problem in \(E(\mathbb{F}_q)\) first.
    0 references
    public-key cryptography
    0 references
    discrete logarithm problem
    0 references
    semi-abelian varieties
    0 references
    elliptic curves
    0 references
    finite fields
    0 references
    pairing-friendly curves
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references