期刊文献+

双线性对计算算法的优化

Refinements of algorithm for computing billear pairings
在线阅读 下载PDF
导出
摘要 基于身份的公钥密码体制独特的优点使其成为PKI公钥密码体制后的一个新研究热点。基于身份的密码体制的实现基于双线性对的快速计算,Miller算法是一种计算线性对的有效算法。利用窗口宽度为w的NAF倍乘算法,结合Miller算法,提出一种有效提高线性对计算速度的方法,这种方法倍加中加法运算次数改进为原来的2/w。 The identity-based public key cryptosystem becomes a new research focus on the current because of its unique advantages after the PKI cryptosystem.The realization about the identity-based cryptosystem is based on the rapid calculation of the bilinear pairing,and the Miller algorithm is an effective way to calculate the pairing.Combining the NAF algorithm about the window width w with Miller algorithm,the paper gives an effective method to improve the calculation speed about the linear pairing,and this method makes the times of the addition operators as 2/w of the original ones.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第15期41-42,46,共3页 Computer Engineering and Applications
基金 国家自然科学基金No.60773128 安徽省高等学校省级自然科学研究项目No.KJ2010B086~~
关键词 基于身份的密码系统 椭圆曲线 Weil/Tate对 非相邻表示型 Miller算法 identity-based cryptography elliptic curves Weil/Tate pairing non adjacent form Miller algorithm
  • 相关文献

参考文献15

  • 1Shamir A.Identity-based cryptosytems and signature schemes[C]// Advaces in Cryptology Crypto'84.[S.l.]:Springer-Verlag, 1984:47-53.
  • 2Boneh D,Franklin M.Identity-based encryption from the weil paring[C]//Kilian J.Advances in Cryptology--Crypto 2001.Berlin,Heidelberg: Springer-Verlag, 2001 : 213-229.
  • 3Menezes A.An introduction to pairing-based cryptography[EB/OL]. http://www.cacr.math.uwaterloo.ca/-ajmeneze/publications/pairings.pdf.
  • 4Durra R,Barua R,Sarkar P.Pairing-based cryptographic protocols:A survey,Report 2004/064[R/OL].Cryptology ePrint Archive,2004.http:// eprint.iacr.org/2004/064.pdf.
  • 5Paterson K G,Price G.A comparison between traditional public key infrastructures and identity-based cryptography[J].Information Security Technical Report,2003,8(3):57-72.
  • 6Blake I F,Seuoussi G,Smart N P.Advances in elliptic curve cryptography[M].New York:Cambridge University Press,2005.
  • 7Silverman J H.The arithmetic of elliptic curves[M].Beijing:Beijing World Publishing Corporation, 1999.
  • 8Lipmaa H,Mao Wenbo,Jakobsson M.Cryptographic protocols:Techniques for secure protocol design[M].[S.l.] : Prentice-Hall, 2006 : 114-147.
  • 9Maas M.Pairing-based cryptography[D].Technisehe Universiteit Eindhoven, 2004.
  • 10Scott M.Implementing cryptographic pairings[EB/OL].ftp://ftp.computing.dcu.ie/pub/resources/crypto/pairings.pdf.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部