### Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation

Aurore Guillevic, Simon Masson, and Emmanuel Thomé

##### Abstract

Recent algorithmic improvements of discrete logarithm computation in special extension fields threaten the security of pairing-friendly curves used in practice. A possible answer to this delicate situation is to propose alternative curves that are immune to these attacks, without compromising the efficiency of the pairing computation too much. We follow this direction, and focus on embedding degrees 5 to 8; we extend the Cocks-Pinch algorithm to obtain pairing-friendly curves with an efficient ate pairing. We carefully select our curve parameters so as to thwart possible attacks by “special” or “tower” Number Field Sieve algorithms. We target a 128-bit security level, and back this security claim by time estimates for the DLP computation. We also compare the efficiency of the optimal ate pairing computation on these curves to k = 12 curves (Barreto–Naehrig,Barreto–Lynn–Scott), k = 16 curves (Kachisa–Schaefer–Scott) and k = 1 curves (Chatterjee–Menezes–Rodríguez-Henríquez).

Available format(s)
Category
Public-key cryptography
Publication info
Preprint.
Contact author(s)
simon masson @ loria fr
History
2019-10-01: revised
See all versions
Short URL
https://ia.cr/2019/431

CC BY

BibTeX

@misc{cryptoeprint:2019/431,
author = {Aurore Guillevic and Simon Masson and Emmanuel Thomé},
title = {Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation},
howpublished = {Cryptology ePrint Archive, Paper 2019/431},
year = {2019},
note = {\url{https://eprint.iacr.org/2019/431}},
url = {https://eprint.iacr.org/2019/431}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.