Advertisement

Algorithms and Architectures for Use in FPGA Implementations of Identity Based Encryption Schemes

  • Tim Kerins
  • Emanuel Popovici
  • William Marnane
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3203)

Abstract

In this paper algorithms and architectures for new GF(3 m ) multiplier and inverter components are presented. It is described how they can be utilized as part of a hardware implementation of an Identity Based Encryption (IBE) scheme. The main computation, the Tate pairing in such a scheme in outlined and it is illustrated how it can be implemented on reconfigurable hardware using these components.

Keywords

Elliptic Curve FPGA Implementation Tate Pairing Digit Serial Elliptic Curve Point 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Koblitz, N.: Algebraic Aspects of Cryptography. In: Algorithms and Computation in Mathematics, vol. 3, Springer, Heidelberg (1999)Google Scholar
  2. 2.
    Shamir, A.: Identity Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1984)CrossRefGoogle Scholar
  3. 3.
    Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  4. 4.
    Blake, I., Seroussi, G., Smart, N.: Elliptic Curves in Cryptography. London Mathematica Society Lecture Note Series, vol. 265. Cambridge University Press, Cambridge (2000)Google Scholar
  5. 5.
    Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the Tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 324–337. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  6. 6.
    Page, D., Smart, N.P.: Hardware Implementation of Finite Fields of Characteristic Three. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 529–539. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Bertoni, G., Guajardo, J., Kumar, S., Orlando, G., Paar, C., Wollinger, T.: Efficient GF(pm) Arithmetic Architectures for Cryptographic Applications. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 158–175. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    Kerins, T., Popocici, E.M., Marnane, W.P.: Fully Paramaterisable Galois Field Arithmetic Processor over GF(3m) suitable for Elliptic Curve Cryptography. In: Proc. of MIEL 2004, pp. 739–742 (2004)Google Scholar
  9. 9.
    Brunner, H., Curgier, A., Hofstetter, M.: On Computing Multiplicative Inverses in GF(2m). IEEE Transactions on Computers 42(8), 1010–1015 (1993)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Tim Kerins
    • 1
  • Emanuel Popovici
    • 2
  • William Marnane
    • 1
  1. 1.Dept. of Electrical and Electronic EngineeringUniversity College CorkCork CityIreland
  2. 2.Dept. of Microelectronic EngineeringUniversity College CorkCork CityIreland

Personalised recommendations