TY - JOUR
T1 - Pairing inversion via non-degenerate auxiliary pairings
AU - Chang, Seunghwan
AU - Hong, Hoon
AU - Lee, Eunjeong
AU - Lee, Hyang Sook
PY - 2014
Y1 - 2014
N2 - The security of pairing-based cryptosystems is closely related to the difficulty of the pairing inversion problem(PI). In this paper, we discuss the difficulty of pairing inversion on the generalized ate pairings of Vercauteren. First, we provide a simpler approach for PI by generalizing and simplifying Kanayama-Okamoto's approach; our approach involves modifications of exponentiation inversion(EI) and Miller inversion(MI), via an "auxiliary" pairing. Then we provide a complexity of the modified MI, showing that the complexity depends on the sum-norm of the integer vector defining the auxiliary pairing. Next, we observe that degenerate auxiliary pairings expect to make modified EI harder. We provide a sufficient condition on the integer vector, in terms of its max norm, so that the corresponding auxiliary paring is non-degenerate. Finally, we define an infinite set of curve parameters, which includes those of typical pairing friendly curves, and we show that, within those parameters, PI of arbitrarily given generalized ate pairing can be reduced to modified EI in polynomial time.
AB - The security of pairing-based cryptosystems is closely related to the difficulty of the pairing inversion problem(PI). In this paper, we discuss the difficulty of pairing inversion on the generalized ate pairings of Vercauteren. First, we provide a simpler approach for PI by generalizing and simplifying Kanayama-Okamoto's approach; our approach involves modifications of exponentiation inversion(EI) and Miller inversion(MI), via an "auxiliary" pairing. Then we provide a complexity of the modified MI, showing that the complexity depends on the sum-norm of the integer vector defining the auxiliary pairing. Next, we observe that degenerate auxiliary pairings expect to make modified EI harder. We provide a sufficient condition on the integer vector, in terms of its max norm, so that the corresponding auxiliary paring is non-degenerate. Finally, we define an infinite set of curve parameters, which includes those of typical pairing friendly curves, and we show that, within those parameters, PI of arbitrarily given generalized ate pairing can be reduced to modified EI in polynomial time.
UR - http://www.scopus.com/inward/record.url?scp=84894419217&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-04873-4_5
DO - 10.1007/978-3-319-04873-4_5
M3 - Conference article
AN - SCOPUS:84894419217
SN - 0302-9743
VL - 8365 LNCS
SP - 77
EP - 96
JO - Lecture Notes in Computer Science
JF - Lecture Notes in Computer Science
T2 - 6th International Conference on Pairing-Based Cryptography, Pairing 2013
Y2 - 22 November 2013 through 24 November 2013
ER -