Cryptography Reference
In-Depth Information
Algorithm 13.3: The
η
algorithm
Input : P
= (
x P
,
y P
) G 1 and Q
= (
x Q
,
y Q
) G 2
Output : e
(
P
,
Q
)
G T
1 f 1
2 for i = 1 upto m do
3
x P , y P
y P
x P
μ
x P
+
x Q
4
λ μ +
x P x Q
+
y P
+
y Q
+
b
5
t 2
g
λ + μ
t
+ +
1
)
6
f
f
·
g
7
x 1 / 2
Q
y 1 / 2
Q
x Q
, y Q
8
9 end
10 return f q 2
1
Algorithm 13.4: The
η G algorithm
Input : P = ( x P , y P ) ∈ G 1 and Q = ( x Q , y Q ) ∈ G 2
Output : e ( P , Q ) G T
f
1
1
2 T
P
3 for i
=
1 upto m do
λ x T +
1
4
t 2
u
(
y Q
+
y T
+ λ(
x Q
+
x T
+
1
)) + +
x Q
+
q
)
t
+ +
x Q
+
1
)
5
t 2
v
(
x Q
+
x T
+
1
) +
t
+
6
f 2
u
v
·
f
7
T
←[ 2 ] T
8
9 end
10 return f
y 2
x 3
E
:
+
y
=
+
x
+
b
s 2
t 2
with b
∈ F 2 .If
F q 2
= F q [
s
] /(
+
s
+
1
)
and
F q 4
= F q 2
[
t
] /(
+
t
+
s
)
then
s 2
the distortion map
φ :
E
( F q )
E
( F q 4
)
is defined by
φ(
x
,
y
) = (
x
+
,
y
+
t 5
and that t satisfies t 4
sx
+
t
)
. Note that s
=
=
t
+
1, so we can also represent
t 4
F q 4 as
F q [
t
] /(
+
t
+
1
)
. Then, by setting
G 1
= G 2
=
E
( F q )
and
G T
= F q 4 ,
Algorithms 13.3 and 13.4 compute admissible symmetric pairings.
13.2.4 The Ate Pairings
The ate pairing was introduced by Hess et al. [181] and generalises the
η
-pairing
to ordinary elliptic curves. The main difference between the Tate and
η
-pairings is
that the arguments are swapped, i.e., the ate pairing is defined on
G 2 × G 1 . Further-
 
Search WWH ::




Custom Search