Cryptology ePrint Archive: Report 2022/277
Security Analysis of Elliptic Curves over Sextic Extension of Small Prime Fields
Robin Salen and Vijaykumar Singh and Vladimir Soukharev
Abstract: In this report we investigate how to generate secure elliptic curves over sextic extension of prime fields of size roughly 64 bits to achieve 128-bit security. In particular, we present one of such curves over a 64-bit prime field, which we named Cheetah, and provide its security parameter. This curve is particularly well-suited for zero-knowledge applications such as FRI-based STARK proving systems, as its base prime field has the property of having a large two-adicity, necessary for FFT-related operations and
at the same time it is used for elliptic curve-based signatures. We also provide a prototype implementation of this curve in Rust, featuring constant-time arithmetic and no use of the Rust standard library for WebAssembly support.
Category / Keywords: foundations / elliptic curves, digital signatures, zero-knowledge proofs, stark, blockchain, field extension
Date: received 1 Mar 2022, last revised 2 Mar 2022
Contact author: salen at toposware com, vijaykumar singh at toposware com, vladimir soukharev at toposware com
Available format(s): PDF | BibTeX Citation
Version: 20220302:164443 (All versions of this report)
Short URL: ia.cr/2022/277
[ Cryptology ePrint archive ]