Skip to main content

A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3810))

Abstract

The window algorithms for various signed binary representations have been used to speed up point multiplication on elliptic curves. While there’s been extensive research on the non-adjacent form, little attention has been devoted to non-sparse optimal signed binary representations. In the paper, we prove some properties of non-sparse optimal signed binary representations and present a precise analysis of the non-sparse signed window algorithm. The main contributions are described as follows. Firstly, we attain the lower bound k+1/3 of the expected length of non-sparse optimal signed binary representations of k-bit positive integers. Secondly, we propose a new non-sparse signed window partitioning algorithm. Finally, we analyze Koyama-Tsuruoka’s non-sparse signed window algorithm and the proposed algorithm and compare them with other methods. The upper bound \(\frac{5}{6}\cdot 2^{w-1} -1+\frac{(-1)^{w}}{3}\) of the number of precomputed windows of the non-sparse signed window algorithms is attained.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48, 203–209 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  2. Miller, V.S.: Use of elliptic curve in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

  3. Knuth, D.E.: The Art of Computer Programming, 3rd edn. Seminumerical Algorithms, vol. 2. Addison-Wesley, Reading (1998)

    Google Scholar 

  4. Cohen, H.: A Course in Computational Algebraic Number Theory. Graduate Texts in Mathematics, vol. 138. Springer, Heidelberg (1993)

    MATH  Google Scholar 

  5. Koc, C.K.: Analysis of sliding window techniques for exponentiation. Computers and Mathematics with Applications 30(10), 17–24 (1995)

    Article  MATH  MathSciNet  Google Scholar 

  6. Rizzo, O.: On the complexity of the 2k-ary and of the sliding window algorithms for fast exponentiation. Rivista di Matematica dell’Universitá di Parma 7(3) (2004)

    Google Scholar 

  7. Gordon, D.M.: A Survey of Fast Exponentiation Methods. Journal of Algorithms 27, 129–146 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  8. Booth, A.D.: A Signed Binary Multiplication Technique. Q. J. Mech. Appl. Math. 4(2), 236–240 (1951)

    Article  MATH  MathSciNet  Google Scholar 

  9. Reitwiesner, G.W.: Binary arithmetic. Advances in Computers 1, 231–308 (1960)

    Article  MathSciNet  Google Scholar 

  10. Morain, F., Olivos, J.: Speeding up the computations on an elliptic curve using addition-subtraction chains. Theoretical Informatics and Applications 24, 531–543 (1990)

    MATH  MathSciNet  Google Scholar 

  11. Koyama, K., Tsuruoka, T.: Speeding up elliptic curve cryptosystems using a signed binary window method. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 345–357. Springer, Heidelberg (1993)

    Google Scholar 

  12. Kunihiro, N., Yamamoto, H.: Window and extended window methods for addition-subtraction chain. IEICE Trans. on Fundamentals E81-A(1), 72–81 (1998)

    Google Scholar 

  13. De Win, E., Mister, S., Preneel, B., Wiener, M.: On the Performance of Signature Schemes based on Elliptic Curves. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 252–266. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  14. Miyaji, A., Ono, T., Cohen, H.: Efficient elliptic curve exponentiation. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 282–290. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  15. Solinas, J.A.: An improved algorithm for arithmetic on a family of elliptic curves. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 357–371. Springer, Heidelberg (1997)

    Google Scholar 

  16. Solinas, J.A.: Efficient arithmetic on Koblitz curves. Designs, Codes and Cryptography 19, 195–249 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  17. Cohen, H.: Analysis of the sliding window powering algorithm. J. of Cryptology 18(1), 63–76 (2005)

    Article  MATH  Google Scholar 

  18. Muir, J.A., Stinson, D.R.: Minimality and Other Properties of the Width-w Nonadjacent Form. To appear in Mathematics of Computation, Available at http://www.ccsl.carleton.ca/~jamuir/papers/wNAF-revised-3.pdf

  19. Joye, M., Yen, S.M.: Optimal left-to-right binary signed-digit recoding. IEEE Trans. on Comp. 49(7), 740–748 (2000)

    Article  Google Scholar 

  20. Avanzi, R.M.: A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 130–143. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  21. Okeya, K., Schmidt-Samoa, K., Spahn, C., Takagi, T.: Signed Binary Representations Revisited. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 123–139. Springer, Heidelberg (2004)

    Google Scholar 

  22. Muir, J.A., Stinson, D.R.: New Minimal Weight Representations for Left-to-Right Window Methods. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 366–383. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  23. Möller, B.: Improved Techniques for Fast Exponentiation. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 298–312. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  24. Möller, B.: Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 137–153. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  25. Arno, S., Wheeler, F.S.: Signed digit representations of minimal hamming weight. IEEE Transactions on Computers 42(8), 1007–1010 (1993)

    Article  Google Scholar 

  26. Egecioglu, O., Koc, C.K.: Exponentiation using canonical recoding. Theoretical Computer Science 129(2), 407–417 (1994)

    Article  MathSciNet  Google Scholar 

  27. Bosma, W.: Signed Bits and Fast Exponentiation. J. Théor. Nombres Bordeaux 13(1), 27–41 (2001)

    MATH  MathSciNet  Google Scholar 

  28. Avanzi, R.M.: On multi-exponentiation in cryptography, Technical Report 2002/154, Cryptology ePrint Archive (2002), Available at http://eprint.iacr.org/2002/154

  29. Avanzi, R.M.: On the complexity of certain multi-exponentiation techniques in cryptography. J. of Cryptology, Online First (2005)

    Google Scholar 

  30. Heuberger, C., Grabner, P.: On the number of optimal base 2 representations of integers, Preprint available at http://www.opt.math.tu-graz.ac.at/~cheub/publications

  31. Phillips, B., Burgess, N.: Minimal Weight Digit Set Conversions. IEEE Transactions on Computers 53(6), 666–677 (2004)

    Article  Google Scholar 

  32. Semay, O.: Efficiency analysis of window methods using Markov chains, Diplomarbeit (Summer 2004), Available at http://www.cdc.informatik.tu-darmstadt.de/reports/reports/KP/Olivier_Semay.diplom.ps

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kong, F., Li, D. (2005). A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds) Cryptology and Network Security. CANS 2005. Lecture Notes in Computer Science, vol 3810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599371_19

Download citation

  • DOI: https://doi.org/10.1007/11599371_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30849-2

  • Online ISBN: 978-3-540-32298-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics