Quantum Computing for Elliptic Curve Discrete Logarithms

Author(s):  
Song Y. Yan
2017 ◽  
Vol 11 (3) ◽  
pp. 453-469 ◽  
Author(s):  
Steven D. Galbraith ◽  
◽  
Ping Wang ◽  
Fangguo Zhang ◽  
◽  
...  

Author(s):  
Martin Roetteler ◽  
Michael Naehrig ◽  
Krysta M. Svore ◽  
Kristin Lauter

2011 ◽  
Vol 135-136 ◽  
pp. 316-320
Author(s):  
Qi Xie

Signature schemes with message recovery based on self-certified public keys can reduce the amount of communications and computations, since the signature verification, the public key authentication and the message recovery are simultaneously carried out in a single logical step. Integrating self-certified public-key systems and the message recovery signature schemes, in 2009, Wu et al. proposed two multi-proxy signatures based on the discrete logarithms over a finite field and the elliptic curve discrete logarithms. The proxy warrant revision attacks are proposed, and it will show that Wu et al.’s schemes can not resist the proxy warrant revision attacks by either the proxy group or the original signer.


2021 ◽  
Author(s):  
Tan Yongliang ◽  
He Lesheng ◽  
Jin Haonan ◽  
Kong Qingyang

As quantum computing and the theory of bilinear pairings continue being studied in depth, elliptic curves on GF(3m ) are becoming of an increasing interest because they provide a higher security. What’s more, because hardware encryption is more efficient and secure than software encryption in today's IoT security environment, this article implements a scalar multiplication algorithm for the elliptic curve on GF(3m ) on the FPGA device platform. The arithmetic in finite fields is quickly implemented by bit-oriented operations, and then the computation speed of point doubling and point addition is improved by a modified Jacobia projection coordinate system. The final experimental results demonstrate that the structure consumes a total of 7518 slices, which is capable of computing approximately 3000 scalar multiplications per second at 124 Mhz. It has relative advantages in terms of performance and resource consumption, which can be applied to specific confidential communication scenarios as an IP core.


Sign in / Sign up

Export Citation Format

Share Document