On the Possibility of Transformation of Multidimensional ECDLP into 1-Dimensional ECDLP

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10737)


In this article the attack on elliptic curve discrete logarithm problem (ECDLP) with partial information is considered. If unknown bits of discrete logarithm are continuous then 1-dimensional algorithms for ECDLP may be used. One of these algorithms is improved Gaudry-Schost using equivalence classes which requires \(O(1.47\sqrt{n}) \) operations. It will be showed that if unknown bits are not continuous and are given in \(c>1\) partitions and also two most significant bits are known, transformation of this partitions into one partition to use 1-dimensional algorithm without increasing size of the problem is impossible. It is also showed that in some situations it is better to “forget” some of known bits to transform the problem to 1-dimensional ECDLP.


Elliptic curve ECDLP Partial information Multidimensional Gaudry-Schost algorithm 


  1. 1.
    Gaudry, P., Schost, É.: A low-memory parallel version of Matsuo, Chao, and Tsujii’s algorithm. In: Buell, D. (ed.) ANTS 2004. LNCS, vol. 3076, pp. 208–222. Springer, Heidelberg (2004). CrossRefGoogle Scholar
  2. 2.
    Genkin, D., Shamir, A., Tromer, E.: RSA key extraction via low-bandwidth acoustic cryptanalysis. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 444–461. Springer, Heidelberg (2014). CrossRefGoogle Scholar
  3. 3.
    Gopalakrishnan, K., Thériault, N., Yao, C.Z.: Solving discrete logarithms from partial knowledge of the key. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 224–237. Springer, Heidelberg (2007). CrossRefGoogle Scholar
  4. 4.
    Goubin, L.: A refined power-analysis attack on elliptic curve cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 199–211. Springer, Heidelberg (2003). CrossRefGoogle Scholar
  5. 5.
    Lange, T., van Vredendaal, C., Wakker, M.: Kangaroos in side-channel attacks. In: Joye, M., Moradi, A. (eds.) CARDIS 2014. LNCS, vol. 8968, pp. 104–121. Springer, Cham (2015). Google Scholar
  6. 6.
    Pollard, J.M.: Kangaroos, monopoly and discrete logarithms. J. Cryptol. 13, 437–447 (2000)MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Ruprai, R.S.: Improvements to the Gaudry-Schost algorithm for multidimensional discrete logarithm problems and applications. Royal Holloway University of London (2010)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Faculty of Cybernetics, Institute of Mathematics and CryptologyMilitary University of Technology in WarsawWarsawPoland

Personalised recommendations