Paper 2015/1100

Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves.

Anissa Sghaier, Loubna Ghammam, Medyen Zeghid, Sylvain Duquesne, and Mohsen Machhout

Abstract

To have an efficient asymmetric key encryption scheme such as elliptic curves, hyperelliptic curves, pairing etc., we have to go through an arithmetic optimization then a hardware one. Taking into consideration restricted environments’ compromises, we should strike a balance between efficiency and memory resources. For this reason, we studied the mathematical aspect of pairing computation and gave new development of the methods that compute the hard part of the final exponentiation in [2]. They prove that these new methods save an important number of temporary variables, and they are certainly faster than the existing one. In this paper, we will also present a new way of computing Miller loop, more precisely in the doubling algorithm. So we will use this result and the arithmetic optimization presented in [2]. Then, we will apply hardware optimization to find a satisfactory design which give the best compromise between area occupation and execution time. Our hardware implementation on a Virtex-6 FPGA(XC6VHX250T) used only 5976 Slices, 30 DSP, which is less resources used compared with state-ofthe-art hardware implementations, so we can say that our approach cope with the limited resources of restricted environment

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
: BN curvesOptimal Ate PairingArithmetic optimizationmemory resourceshardware implementations
Contact author(s)
ghammam loubna @ yahoo fr
History
2016-01-25: revised
2015-11-14: received
See all versions
Short URL
https://ia.cr/2015/1100
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/1100,
      author = {Anissa Sghaier and Loubna Ghammam and Medyen Zeghid and Sylvain Duquesne and Mohsen Machhout},
      title = {Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves.},
      howpublished = {Cryptology ePrint Archive, Paper 2015/1100},
      year = {2015},
      note = {\url{https://eprint.iacr.org/2015/1100}},
      url = {https://eprint.iacr.org/2015/1100}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.