ACISP 2000: Information Security and Privacy pp 59-73 | Cite as
Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance
Abstract
We introduce efficient algorithms for scalar multiplication on elliptic curves defined over \(\mathbb{F}_p\). The algorithms compute 2 k P directly from P, where P is a random point on an elliptic curve, without computing the intermediate points, which is faster than k repeated doublings. Moreover, we apply the algorithms to scalar multiplication on elliptic curves, and analyze their computational complexity. As a result of their implementation with respect to affine (resp. weighted projective) coordinates, we achieved an increased performance factor of 1.45 (45%) (resp. 1.15 (15%)) in the scalar multiplication of the elliptic curve of size 160-bit.
Keywords
Elliptic Curve Cryptosystems Scalar Multiplication Window Method Coordinate System ImplementationPreview
Unable to display preview. Download preview PDF.
References
- CC86.Chudnovsky, D.V., Chudnovsky, G.V.: Sequences of numbers generated by addition in formal groups and new primality and factorization tests. Advances in Applied Math. 7, 385–434 (1986)MATHMathSciNetCrossRefGoogle Scholar
- CMO98.Cohen, H., Miyaji, A., Ono, T.: Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 51–65. Springer, Heidelberg (1998)CrossRefGoogle Scholar
- Go98.Gordon, D.M.: A survey of fast exponentiation methods. Journal of Algorithms 27, 129–146 (1998)MATHMathSciNetCrossRefGoogle Scholar
- GP97.Guajardo, J., Paar, C.: Efficient Algorithms for Elliptic Curve Cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 342–356. Springer, Heidelberg (1997)Google Scholar
- HT99.Han, Y., Tan, P.C.: Direct Computation for Elliptic Curve Cryptosystems. In: Pre-proceedings of CHES 1999, pp. 328–340. Springer, Heidelberg (1999)Google Scholar
- IEEE.IEEE P1363/D11 (Draft Version 11) (1999), http://grouper.ieee.org/groups/1363/
- ITTTK98.Itoh, K., Takenaka, M., Torii, N., Temma, S., Kurihara, Y.: Fast Implementation of Public-key Cryptography on a DSP TMS320C6201. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 61–72. Springer, Heidelberg (1999)CrossRefGoogle Scholar
- Ko87.Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48, 203–209 (1987)MATHMathSciNetCrossRefGoogle Scholar
- KT92.Koyama, K., Tsuruoka, Y.: Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 345–357. Springer, Heidelberg (1993)Google Scholar
- Le38.Lehmer, D.H.: Euclid’s Algorithm for Large Numbers. American Mathematical Monthly 45, 227–233 (1938)MathSciNetCrossRefGoogle Scholar
- Mi85.Miller, V.: Uses of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)Google Scholar
- MOC97a.Miyaji, A., Ono, T., Cohen, H.: Efficient Elliptic Curve Exponentiation (I). Technical Report of IEICE, ISEC97-16 (1997) Google Scholar
- MOC97b.Miyaji, A., Ono, T., Cohen, H.: Efficient Elliptic Curve Exponentiation. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 282–290. Springer, Heidelberg (1997)CrossRefGoogle Scholar
- Mu97.Müller, V.: Efficient Algorithms for Multiplication on Elliptic Curves, Proceedings of GI-Arbeitskonferenz Chipkarten 1998, TU München (1998) Google Scholar
- NIST.Nist, Recommended Elliptic Curves for Federal Government Use (1999), http://csrc.nist.gov/encryption/
- So97.Solinas, J.A.: An Improved Algorithm for Arithmetic on a Family of Elliptic Curves. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 357–371. Springer, Heidelberg (1997)Google Scholar
- WMPW98.De Win, E., Mister, S., Preneel, B., Wiener, M.: On the Performance of Signature Schemes Based on Elliptic Curves. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 252–266. Springer, Heidelberg (1998)CrossRefGoogle Scholar