Cryptography Reference
In-Depth Information
degree. Let E
( F q ) [
r
]
denote the subgroup of E
( F q )
of all points of order dividing
r , and similarly for the degree k extension of
F q .
To support a description of the attacks we outline parametrizations of, and algo-
rithms for several, concrete pairings. However, we let
e
: G 1 × G 2 −→ G T
g enerically denote such a pairing, whose specific type is determined by the context;
e denotes the same pairing wherein some fault occurs or is injected. The two groups
G 1 and
G 2 will be subgroups of elliptic curve groups, whereas
G T is a subgroup of
the multiplicative group of a finite field.
All currently known pairings evaluate a combination of so-called “Miller func-
tions”, written f n , P ( · )
G 2 . Such a
function is defined as a ratio of two bivariate polynomials, and can be evaluated at an
elliptic curve point Q to yield a resulting finite field element. As is the case for ratios
of univariate polynomials, such a function is uniquely determined (up to multiplica-
tion by a constant) by its zeroes and poles and their respective multiplicities. This
information is precisely contained in the divisor of a function, namely the formal
sum of the zeroes and poles with multiplicities. A Miller function f n , P satisfies
for a given scalar n and a point P , in either
G 1 or
div
(
f n , P ) =
n
(
P
) ( [
n
]
P
) (
n
1
)O,
i.e., the function has a zero at P of order n , a pole of order 1 at the point
[
n
]
P and a
pole of order n
.
Miller [286] described an efficient procedure to compute any function f n , P and
evaluate it at an elliptic curve point. The crucial ingredient is a simple “double-and-
add” strategy based on the following observation: let i and j be positive integers;
then
1at
O
l [ i ] P , [ j ] P
v
f i + j , P =
f i , P ·
f j , P ·
P ,
(13.1)
[
i
+
j
]
where l [ i ] P , [ j ] P is the equation of the line through
[
i
]
P and
[
j
]
P (or the tangent line
[
]
=[
]
[
+
]
when
P .
The resulting algorithm is described in Algorithm 13.1. Scott [364] gives an overview
various approaches to optimization of the algorithm, an important example being the
denominator elimination approach due to Barreto et al. [25]; this allows removal
(assuming a suitable parametrization) of the computationally expensive inversions
otherwise required during updates to the Miller variable f .
i
P
j
P ), and v [ i + j ] P is the equation of the vertical line through
i
j
13.2.1 The Weil Pairing
The Weil pairing was introduced by Weil [287, 418] in 1940 in his proof of the
Riemann hypothesis for curves. The simplified definition is as follows: let E be an
elliptic curve over
F q and let P
,
Q
E
( F q k
) [
r
]
with P
=
Q ; then
Search WWH ::




Custom Search