Abstract
The window algorithms for various signed binary representations have been used to speed up point multiplication on elliptic curves. While there’s been extensive research on the non-adjacent form, little attention has been devoted to non-sparse optimal signed binary representations. In the paper, we prove some properties of non-sparse optimal signed binary representations and present a precise analysis of the non-sparse signed window algorithm. The main contributions are described as follows. Firstly, we attain the lower bound k+1/3 of the expected length of non-sparse optimal signed binary representations of k-bit positive integers. Secondly, we propose a new non-sparse signed window partitioning algorithm. Finally, we analyze Koyama-Tsuruoka’s non-sparse signed window algorithm and the proposed algorithm and compare them with other methods. The upper bound \(\frac{5}{6}\cdot 2^{w-1} -1+\frac{(-1)^{w}}{3}\) of the number of precomputed windows of the non-sparse signed window algorithms is attained.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48, 203–209 (1987)
Miller, V.S.: Use of elliptic curve in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Knuth, D.E.: The Art of Computer Programming, 3rd edn. Seminumerical Algorithms, vol. 2. Addison-Wesley, Reading (1998)
Cohen, H.: A Course in Computational Algebraic Number Theory. Graduate Texts in Mathematics, vol. 138. Springer, Heidelberg (1993)
Koc, C.K.: Analysis of sliding window techniques for exponentiation. Computers and Mathematics with Applications 30(10), 17–24 (1995)
Rizzo, O.: On the complexity of the 2k-ary and of the sliding window algorithms for fast exponentiation. Rivista di Matematica dell’Universitá di Parma 7(3) (2004)
Gordon, D.M.: A Survey of Fast Exponentiation Methods. Journal of Algorithms 27, 129–146 (1998)
Booth, A.D.: A Signed Binary Multiplication Technique. Q. J. Mech. Appl. Math. 4(2), 236–240 (1951)
Reitwiesner, G.W.: Binary arithmetic. Advances in Computers 1, 231–308 (1960)
Morain, F., Olivos, J.: Speeding up the computations on an elliptic curve using addition-subtraction chains. Theoretical Informatics and Applications 24, 531–543 (1990)
Koyama, K., Tsuruoka, T.: Speeding up elliptic curve cryptosystems using a signed binary window method. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 345–357. Springer, Heidelberg (1993)
Kunihiro, N., Yamamoto, H.: Window and extended window methods for addition-subtraction chain. IEICE Trans. on Fundamentals E81-A(1), 72–81 (1998)
De Win, E., Mister, S., Preneel, B., Wiener, M.: On the Performance of Signature Schemes based on Elliptic Curves. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 252–266. Springer, Heidelberg (1998)
Miyaji, A., Ono, T., Cohen, H.: Efficient elliptic curve exponentiation. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 282–290. Springer, Heidelberg (1997)
Solinas, J.A.: An improved algorithm for arithmetic on a family of elliptic curves. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 357–371. Springer, Heidelberg (1997)
Solinas, J.A.: Efficient arithmetic on Koblitz curves. Designs, Codes and Cryptography 19, 195–249 (2000)
Cohen, H.: Analysis of the sliding window powering algorithm. J. of Cryptology 18(1), 63–76 (2005)
Muir, J.A., Stinson, D.R.: Minimality and Other Properties of the Width-w Nonadjacent Form. To appear in Mathematics of Computation, Available at http://www.ccsl.carleton.ca/~jamuir/papers/wNAF-revised-3.pdf
Joye, M., Yen, S.M.: Optimal left-to-right binary signed-digit recoding. IEEE Trans. on Comp. 49(7), 740–748 (2000)
Avanzi, R.M.: A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 130–143. Springer, Heidelberg (2004)
Okeya, K., Schmidt-Samoa, K., Spahn, C., Takagi, T.: Signed Binary Representations Revisited. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 123–139. Springer, Heidelberg (2004)
Muir, J.A., Stinson, D.R.: New Minimal Weight Representations for Left-to-Right Window Methods. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 366–383. Springer, Heidelberg (2005)
Möller, B.: Improved Techniques for Fast Exponentiation. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 298–312. Springer, Heidelberg (2003)
Möller, B.: Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 137–153. Springer, Heidelberg (2005)
Arno, S., Wheeler, F.S.: Signed digit representations of minimal hamming weight. IEEE Transactions on Computers 42(8), 1007–1010 (1993)
Egecioglu, O., Koc, C.K.: Exponentiation using canonical recoding. Theoretical Computer Science 129(2), 407–417 (1994)
Bosma, W.: Signed Bits and Fast Exponentiation. J. Théor. Nombres Bordeaux 13(1), 27–41 (2001)
Avanzi, R.M.: On multi-exponentiation in cryptography, Technical Report 2002/154, Cryptology ePrint Archive (2002), Available at http://eprint.iacr.org/2002/154
Avanzi, R.M.: On the complexity of certain multi-exponentiation techniques in cryptography. J. of Cryptology, Online First (2005)
Heuberger, C., Grabner, P.: On the number of optimal base 2 representations of integers, Preprint available at http://www.opt.math.tu-graz.ac.at/~cheub/publications
Phillips, B., Burgess, N.: Minimal Weight Digit Set Conversions. IEEE Transactions on Computers 53(6), 666–677 (2004)
Semay, O.: Efficiency analysis of window methods using Markov chains, Diplomarbeit (Summer 2004), Available at http://www.cdc.informatik.tu-darmstadt.de/reports/reports/KP/Olivier_Semay.diplom.ps
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kong, F., Li, D. (2005). A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds) Cryptology and Network Security. CANS 2005. Lecture Notes in Computer Science, vol 3810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599371_19
Download citation
DOI: https://doi.org/10.1007/11599371_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30849-2
Online ISBN: 978-3-540-32298-6
eBook Packages: Computer ScienceComputer Science (R0)