Paper 2019/431
Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation
Aurore Guillevic, Simon Masson, and Emmanuel Thomé
Abstract
Recent algorithmic improvements of discrete logarithm computation in special extension fields threaten the security of pairing-friendly curves used in practice. A possible answer to this delicate situation is to propose alternative curves that are immune to these attacks, without compromising the efficiency of the pairing computation too much. We follow this direction, and focus on embedding degrees 5 to 8; we extend the Cocks-Pinch algorithm to obtain pairing-friendly curves with an efficient ate pairing. We carefully select our curve parameters so as to thwart possible attacks by “special” or “tower” Number Field Sieve algorithms. We target a 128-bit security level, and back this security claim by time estimates for the DLP computation. We also compare the efficiency of the optimal ate pairing computation on these curves to k = 12 curves (Barreto–Naehrig,Barreto–Lynn–Scott), k = 16 curves (Kachisa–Schaefer–Scott) and k = 1 curves (Chatterjee–Menezes–Rodríguez-Henríquez).
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Preprint.
- Contact author(s)
- simon masson @ loria fr
- History
- 2019-10-01: revised
- 2019-04-28: received
- See all versions
- Short URL
- https://ia.cr/2019/431
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/431, author = {Aurore Guillevic and Simon Masson and Emmanuel Thomé}, title = {Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/431}, year = {2019}, url = {https://eprint.iacr.org/2019/431} }