Paper 2023/390

Hashing to elliptic curves through Cipolla–Lehmer–Müller’s square root algorithm

Dmitrii Koshelev, École Normale Supérieure de Lyon
Abstract

The present article provides a novel hash function $\mathcal{H}$ to any elliptic curve of $j$-invariant $\neq 0, 1728$ over a finite field $\mathbb{F}_{\!q}$ of large characteristic. The unique bottleneck of $\mathcal{H}$ consists in extracting a square root in $\mathbb{F}_{\!q}$ as well as for most hash functions. However, $\mathcal{H}$ is designed in such a way that the root can be found by (Cipolla--Lehmer--)Müller's algorithm in constant time. Violation of this security condition is known to be the only obstacle to applying the given algorithm in the cryptographic context. When the field $\mathbb{F}_{\!q}$ is highly $2$-adic and $q \equiv 1 \ (\mathrm{mod} \ 3)$, the new batching technique is the state-of-the-art hashing solution except for some sporadic curves. Indeed, Müller's algorithm costs $\approx 2\log_2(q)$ multiplications in $\mathbb{F}_{\!q}$. In turn, original Tonelli--Shanks's square root algorithm and all of its subsequent modifications have the asymptotic complexity $\Theta(\log(q) + g(\nu))$, where $\nu$ is the $2$-adicity of $\mathbb{F}_{\!q}$ and a function $g(\nu) \neq O(\nu)$. As an example, it is shown that Müller’s algorithm actually needs several times fewer multiplications in the field $\mathbb{F}_{\!q}$ (whose $\nu = 96$) of the standardized curve NIST P-224.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Keywords
Cipolla-Lehmer-Müller's algorithmgeneralized Châtelet surfaceshashing to elliptic curveshighly $2$-adic fields
Contact author(s)
dimitri koshelev @ gmail com
History
2024-02-14: last of 4 revisions
2023-03-18: received
See all versions
Short URL
https://ia.cr/2023/390
License
No rights reserved
CC0

BibTeX

@misc{cryptoeprint:2023/390,
      author = {Dmitrii Koshelev},
      title = {Hashing to elliptic curves through Cipolla–Lehmer–Müller’s square root algorithm},
      howpublished = {Cryptology {ePrint} Archive, Paper 2023/390},
      year = {2023},
      url = {https://eprint.iacr.org/2023/390}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.