Cargando…

Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures

Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to di...

Descripción completa

Detalles Bibliográficos
Autores principales: Wang, Maocai, Dai, Guangming, Choo, Kim-Kwang Raymond, Jayaraman, Prem Prakash, Ranjan, Rajiv
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5001717/
https://www.ncbi.nlm.nih.gov/pubmed/27564373
http://dx.doi.org/10.1371/journal.pone.0161857
_version_ 1782450470902562816
author Wang, Maocai
Dai, Guangming
Choo, Kim-Kwang Raymond
Jayaraman, Prem Prakash
Ranjan, Rajiv
author_facet Wang, Maocai
Dai, Guangming
Choo, Kim-Kwang Raymond
Jayaraman, Prem Prakash
Ranjan, Rajiv
author_sort Wang, Maocai
collection PubMed
description Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user’s public key based on the user’s identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al.
format Online
Article
Text
id pubmed-5001717
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-50017172016-09-12 Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures Wang, Maocai Dai, Guangming Choo, Kim-Kwang Raymond Jayaraman, Prem Prakash Ranjan, Rajiv PLoS One Research Article Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user’s public key based on the user’s identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al. Public Library of Science 2016-08-26 /pmc/articles/PMC5001717/ /pubmed/27564373 http://dx.doi.org/10.1371/journal.pone.0161857 Text en © 2016 Wang et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Wang, Maocai
Dai, Guangming
Choo, Kim-Kwang Raymond
Jayaraman, Prem Prakash
Ranjan, Rajiv
Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures
title Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures
title_full Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures
title_fullStr Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures
title_full_unstemmed Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures
title_short Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures
title_sort constructing pairing-friendly elliptic curves under embedding degree 1 for securing critical infrastructures
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5001717/
https://www.ncbi.nlm.nih.gov/pubmed/27564373
http://dx.doi.org/10.1371/journal.pone.0161857
work_keys_str_mv AT wangmaocai constructingpairingfriendlyellipticcurvesunderembeddingdegree1forsecuringcriticalinfrastructures
AT daiguangming constructingpairingfriendlyellipticcurvesunderembeddingdegree1forsecuringcriticalinfrastructures
AT chookimkwangraymond constructingpairingfriendlyellipticcurvesunderembeddingdegree1forsecuringcriticalinfrastructures
AT jayaramanpremprakash constructingpairingfriendlyellipticcurvesunderembeddingdegree1forsecuringcriticalinfrastructures
AT ranjanrajiv constructingpairingfriendlyellipticcurvesunderembeddingdegree1forsecuringcriticalinfrastructures