Advances in Mathematics of Communications (AMC)

Heuristics of the Cocks-Pinch method
Pages: 103 - 118, Issue 1, February 2014

doi:10.3934/amc.2014.8.103      Abstract        References        Full text (411.8K)           Related Articles

Min Sha - Institut de Mathématiques de Bordeaux, Université Bordeaux 1, 351, Cours de la Libération, 33405 Talence Cedex, France (email)

1 R. Avanzi, H. Cohen, C. Doche, G. Frey, T. Lange, K. Nguyen and F. Vercauteren, Handbook of Elliptic and Hyperelliptic Curve Cryptography, CRC Press, 2005.       
2 P. S. L. M. Barreto and M. Naehrig, Pairing-friendly elliptic curves of prime order, in Selected Areas in Cryptography 2005, Springer-Verlag, 2006, 319-331.       
3 P. T. Bateman and R. A. Horn, A heuristic asymptotic formula concerning the distribution of prime numbers, Math. Comp., 16 (1962), 363-367.       
4 D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, SIAM J. Comput., 32 (2003), 586-615.       
5 D. Boneh, E.-J. Goh and K. Nissim, Evaluating 2-DNF formulas on ciphertexts, in Proc. TCC 2005, Springer-Verlag, 2005, 325-341.       
6 D. Boneh, B. Lynn and H. Shacham, Short signatures from the Weil pairing, J. Cryptology, 17 (2004), 297-319.       
7 D. Boneh, K. Rubin and A. Silverberg, Finding composite order ordinary elliptic curves using the Cocks-Pinch method, J. Number Theory, 131 (2011), 832-841.       
8 J. Boxall, Heuristics on pairing-friendly elliptic curves, J. Math. Cryptol., 6 (2012), 81-104.       
9 C. Cocks and R. G. E. Pinch, Identity-based cryptosystems based on the Weil pairing, manuscript, 2001.
10 J. Esmonde and M. R. Murty, Problems in Algebraic Number Theory, Springer-Verlag, 2004.       
11 S. Finch, G. Martin and P. Sebah, Roots of unity and nullity modulo $n$, Proc. Amer. Math. Soc., 138 (2010), 2729-2743.       
12 D. Freeman, M. Scott and E. Teske, A taxonomy of pairing-friendly elliptic curves, J. Cryptology, 23 (2010), 224-280.       
13 G. Frey and H. Rück, A remark concerning $m$-divisibility and the discrete logarithm in the divisor class group of curves, Math. Comp., 62 (1994), 865-874.       
14 S. Galbraith, Pairings, in Advances in Elliptic Curve Cryptography (eds. I. Blake, G. Seroussi and N. Smart), Cambridge University Press, 2005, 183-213.       
15 G.H. Hardy and E.M. Wright, An Introduction to the Theory of Numbers, Oxford University Press, Oxford, 1979.       
16 T. Hayashi, T. Shimoyama, N. Shinohara and T. Takagi, Breaking pairing-based cryptosystems using $\eta_T$ pairing over $GF(3^{97})$, in Asiacrypt 2012, Springer-Verlag, 2012, 43-60.
17 A. Joux, A one round protocol for tripartite Diffie-Hellman, in Algorithmic Number Theory Symposium 2000, Springer-Verlag, 2000, 385-393.       
18 N. Koblitz and A. J. Menezes, Pairing-based cryptography at high security levels, in Cryptography and Coding, Springer-Verlag, 2005, 13-36.       
19 J. Korevaar and H. Te Riele, Average prime-pair counting formula, Math. Comp., 79 (2010), 1209-1229.       
20 F. Luca and I. E. Shparlinski, Elliptic curves with low embedding degree, J. Cryptology, 19 (2006), 553-562.       
21 A. Menezes, T. Okamoto and S. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Trans. Inform. Theory, 39 (1993), 1639-1646.       
22 V. Miller, The Weil pairing, and its efficient calculation, J. Cryptology, 17 (2004) 235-261.       
23 A. Miyaji, M. Nakabayashi and S. Takano, New explicit conditions of elliptic curve traces for FR-reduction, IEICE Trans. Fundam., E84-A (2001), 1234-1243.
24 W. Narkiewicz, Elementary and Analytic Theory of Algebraic Numbers, Springer-Verlag, 2004.       
25 PARI/GP, version 2.5.3, Bordeaux, 2012; available from http://pari.math.u-bordeaux.fr/
26 K. Paterson, Cryptography from pairings, in Advances in Elliptic Curve Cryptography (eds. I. Blake, G. Seroussi and N. Smart), Cambridge University Press, 2005, 215-251.       
27 R. Sakai, K. Ohgishi and M. Kasahara, Cryptosystems based on pairing, in Symp. Crypt. Inf. Secur. 2000, Okinawa, Japan, 2000.
28 A. V. Sutherland, Computing Hilbert class polynomials with the Chinese remainder theorem, Math. Comp., 80 (2011), 501-538.       
29 J. J. Urroz, F. Luca and I. E. Shparlinski, On the number of isogeny classes and pairing-friendly elliptic curves and statistics for MNT curves, Math. Comp., 81 (2012), 1093-1110.       
30 E. Verheul, Evidence that XTR is more secure than supersingular elliptic curve cryptosystems, J. Cryptology, 17 (2004), 277-296.       

Go to top