Cryptography Reference
In-Depth Information
1 induced by the map from
1 to G q, 2 .
We now present the partial group operations on
A
A
1 is not a group with respect to these operations, since the identity element
of G q, 2 is not represented as an element of
We stress that
A
1 .
A
1 define ab
Lemma 6.3.12 Let the notation be as above. For a,b
∈ A
=
( ab
B ) / ( a
+
A ) and a =
a. Then abis the product and a is the inverse for the partial group
b
A
law.
1
Proof The partial group law on
A
is defined by comp 2 (decomp 2 ( a )decomp 2 ( b )). Now
a
b
+
θ
+
θ
ab
B
+
( a
+
b
A ) θ
decomp 2 ( a )decomp 2 ( b )
=
=
A ) θ .
a
+
θ
b
+
θ
ab
B
+
( a
+
b
The formula for ab follows.
Similarly,
a
+
θ
a
+
(
A
θ )
decomp 2 ( a ) 1
=
θ =
θ ) ,
a
+
a
+
(
A
which gives the formula for a .
It follows that one can compute directly with the compressed representation of elements
1 requires an inversion, so is not
very efficient. For cryptographic applications one is usually computing comp 2 ( g n )from
comp 2 ( g ); to do this one decompresses to obtain g
T 2 (
F q ). Note that computing the partial group law on
A
of
G q, 2 , then computes g n using any one
of a number of techniques and finally applies comp 2 to obtain a compact representation. 3
6.3.2 Lucas sequences
Lucas sequences 4 can be used for efficient computation in quadratic fields. We give the
details for G q, 2 ⊂ F q 2 . The name LUC cryptosystem is applied to any cryptosystem using
Lucas sequences to represent elements in an algebraic group quotient of G 2 ,q . Recall the
trace Tr F q 2 / F q ( g )
g q for g
=
g
+
∈ F q 2 .
∈ F q 2 satisfy g q + 1
=
∈ Z
define V i =
Tr F q 2 / F q ( g i ).
Definition 6.3.13 Let g
1. For i
Lemma 6.3.14 Let g
=
v 1 +
w 1 θ with v 1 ,w 1 ∈ F q and θ as in equation ( 6.1 ). Suppose
g q + 1
=
1 and let V i be as in Definition 6.3.13 . Then, for i,j
∈ Z
:
1. V 0 =
2 and V 1 =
Tr F q 2 / F q ( g )
=
2 v 1
Aw 1 .
2. V i =
V i .
3. V i + 1 =
V 1 V i
V i 1 .
V i
4. V 2 i =
2 .
5. V 2 i 1 =
V i V i 1
V 1 .
3
This is analgous to using projective coordinates for efficient elliptic curve arithmetic; see Exercise 9.1.5 .
4
They are named after Edouard Lucas (1842-1891); who apparently died due to a freak accident involving broken crockery.
Lucas sequences were used for primality testing and factorisation before their cryptographic application was recognised.
Search WWH ::




Custom Search