Abstract
Addition chains are classical tools used to speed up exponentiation in cryptographic algorithms. In this paper we proposed to use a subset of addition chains, the Euclidean addition chains, in order to define a new public key cryptosystem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bahig, H.M.: Improved generation of minimal addition chains. Computing 78(2), 161–172 (2006)
Brauer, A.: On addition chains. Bull. Amer. Math. Soc. 45, 736–739 (1939)
Chevallier-Mames, B., Naccache, D., Stern, J.: Linear bandwidth naccache-stern encryption. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 327–339. Springer, Heidelberg (2008)
Downey, P.J., Leong, B.L., Sethi, R.: Computing sequences with addition chains. SIAM J. Comput. 10(3), 638–646 (1981)
Goundar, R., Shiota, K., Toyonaga, M.: Spa resistant scalar multiplication using golden ration addition chain method. International Journal of Applied Mathematics 38(2), 83–88 (2008)
Knuth, D.E.: The Art of Computer Programming: Fundamental Algorithms, 3rd edn., vol. 2. Addison Wesley, Reading (July 1997)
Meloni, N.: Arithmétique pour la Cryptographie basée sur les Courbes Elliptiques. Ph.D. thesis, Université de Montpellier, France (2007)
Meloni, N.: New point addition formulae for ECC applications. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol. 4547, pp. 189–201. Springer, Heidelberg (2007)
Montgomery, P.L.: Evaluating recurrences of form X m + n = f(X m ,X n ,X m − n ) via Lucas chains (2002), ftp://ftp.cwi.nl/pub/pmontgom/Lucas.ps.gz
Naccache, D., Stern, J.: A new public-key cryptosystem. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 27–36. Springer, Heidelberg (1997)
Sholz, A.: Aufgabe 253. Jahresbericht der deutschen Mathematiker-Vereinigung 47, 41–42 (1937)
Subbarao, M.: Addition chains - some results and problems. Number Theory and Applications, 555–574 (1989)
Yao, A.C.: On the evaluation of powers. SIAM Journal on Computing 5(1), 100–103 (1976)
Yao, A.C., Knuth, D.E.: Analysis of the substractive algorithm for greatest common divisors. Proc. Nat. Acad. Sci. USA 72(12), 4720–4722 (1975)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Herbaut, F., Véron, P. (2010). A Public Key Cryptosystem Based upon Euclidean Addition Chains. In: Carlet, C., Pott, A. (eds) Sequences and Their Applications – SETA 2010. SETA 2010. Lecture Notes in Computer Science, vol 6338. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15874-2_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-15874-2_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15873-5
Online ISBN: 978-3-642-15874-2
eBook Packages: Computer ScienceComputer Science (R0)