August  2007, 1(3): 281-286. doi: 10.3934/amc.2007.1.281

On finite fields for pairing based cryptography

1. 

Instituto de Matemáticas, Universidad Nacional Autonoma de México, C.P. 58089, Morelia, Michoacán, Mexico

2. 

Department of Computing, Macquarie University, Sydney, NSW 2109, Australia

Received  July 2006 Revised  June 2007 Published  July 2007

Here, we improve our previous bound on the number of finite fields over which elliptic curves of cryptographic interest with a given embedding degree and small complex multiplication discriminant may exist. We also give some heuristic arguments which lead to a lower bound which in some cases is close to our upper bound.
Citation: Florian Luca, Igor E. Shparlinski. On finite fields for pairing based cryptography. Advances in Mathematics of Communications, 2007, 1 (3) : 281-286. doi: 10.3934/amc.2007.1.281
[1]

Gérard Maze, Chris Monico, Joachim Rosenthal. Public key cryptography based on semigroup actions. Advances in Mathematics of Communications, 2007, 1 (4) : 489-507. doi: 10.3934/amc.2007.1.489

[2]

Zalman Balanov, Meymanat Farzamirad, Wieslaw Krawcewicz, Haibo Ruan. Applied equivariant degree. part II: Symmetric Hopf bifurcations of functional differential equations. Discrete & Continuous Dynamical Systems - A, 2006, 16 (4) : 923-960. doi: 10.3934/dcds.2006.16.923

[3]

Diego F. Aranha, Ricardo Dahab, Julio López, Leonardo B. Oliveira. Efficient implementation of elliptic curve cryptography in wireless sensors. Advances in Mathematics of Communications, 2010, 4 (2) : 169-187. doi: 10.3934/amc.2010.4.169

[4]

Anton Stolbunov. Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves. Advances in Mathematics of Communications, 2010, 4 (2) : 215-235. doi: 10.3934/amc.2010.4.215

[5]

Filippo Gazzola. Critical exponents which relate embedding inequalities with quasilinear elliptic problems. Conference Publications, 2003, 2003 (Special) : 327-335. doi: 10.3934/proc.2003.2003.327

[6]

Philip N. J. Eagle, Steven D. Galbraith, John B. Ong. Point compression for Koblitz elliptic curves. Advances in Mathematics of Communications, 2011, 5 (1) : 1-10. doi: 10.3934/amc.2011.5.1

[7]

Indranil Biswas, Georg Schumacher, Lin Weng. Deligne pairing and determinant bundle. Electronic Research Announcements, 2011, 18: 91-96. doi: 10.3934/era.2011.18.91

[8]

Junbo Jia, Zhen Jin, Lili Chang, Xinchu Fu. Structural calculations and propagation modeling of growing networks based on continuous degree. Mathematical Biosciences & Engineering, 2017, 14 (5&6) : 1215-1232. doi: 10.3934/mbe.2017062

[9]

Alice Silverberg. Some remarks on primality proving and elliptic curves. Advances in Mathematics of Communications, 2014, 8 (4) : 427-436. doi: 10.3934/amc.2014.8.427

[10]

David L. Finn. Convexity of level curves for solutions to semilinear elliptic equations. Communications on Pure & Applied Analysis, 2008, 7 (6) : 1335-1343. doi: 10.3934/cpaa.2008.7.1335

[11]

Joseph H. Silverman. Local-global aspects of (hyper)elliptic curves over (in)finite fields. Advances in Mathematics of Communications, 2010, 4 (2) : 101-114. doi: 10.3934/amc.2010.4.101

[12]

Ravi Vakil and Aleksey Zinger. A natural smooth compactification of the space of elliptic curves in projective space. Electronic Research Announcements, 2007, 13: 53-59.

[13]

Weichao Yue, Weihua Gui, Xiaofang Chen, Zhaohui Zeng, Yongfang Xie. Evaluation strategy and mass balance for making decision about the amount of aluminum fluoride addition based on superheat degree. Journal of Industrial & Management Optimization, 2017, 13 (5) : 1-22. doi: 10.3934/jimo.2018169

[14]

Harish Garg, Kamal Kumar. Group decision making approach based on possibility degree measure under linguistic interval-valued intuitionistic fuzzy set environment. Journal of Industrial & Management Optimization, 2017, 13 (5) : 1-23. doi: 10.3934/jimo.2018162

[15]

Randall Dougherty and Thomas Jech. Left-distributive embedding algebras. Electronic Research Announcements, 1997, 3: 28-37.

[16]

Andreas Klein. How to say yes, no and maybe with visual cryptography. Advances in Mathematics of Communications, 2008, 2 (3) : 249-259. doi: 10.3934/amc.2008.2.249

[17]

Gerhard Frey. Relations between arithmetic geometry and public key cryptography. Advances in Mathematics of Communications, 2010, 4 (2) : 281-305. doi: 10.3934/amc.2010.4.281

[18]

Dong Eui Chang, David F. Chichka, Jerrold E. Marsden. Lyapunov-based transfer between elliptic Keplerian orbits. Discrete & Continuous Dynamical Systems - B, 2002, 2 (1) : 57-67. doi: 10.3934/dcdsb.2002.2.57

[19]

Andrea Natale, François-Xavier Vialard. Embedding Camassa-Holm equations in incompressible Euler. Journal of Geometric Mechanics, 2019, 11 (2) : 205-223. doi: 10.3934/jgm.2019011

[20]

Thais Bardini Idalino, Lucia Moura. Embedding cover-free families and cryptographical applications. Advances in Mathematics of Communications, 2019, 13 (4) : 629-643. doi: 10.3934/amc.2019039

2018 Impact Factor: 0.879

Metrics

  • PDF downloads (8)
  • HTML views (0)
  • Cited by (0)

Other articles
by authors

[Back to Top]