Secure hyperelliptic cryptosystems and their performance

Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Citations (Scopus)

Abstract

We investigate the discrete logarithm problem over jacobian varieties of hypereUiptic curves suitable for public-key cryptosysterns, and clarify practical advantages of hyperelliptic cryptosystems compared to the elliptic cryptosystems and to RSA. We focus on the curves defined over the ground field of characteristic 2, and we present hyperelliptic cryptosystems from the jacobian associated with curves[Formula Presented]of genus g=3 and 11, which are secure against the known attacks. We further discuss the efficiency in implementation of such secure hyperelliptic cryptosystems.

Original languageEnglish
Title of host publicationPublic Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings
EditorsYuliang Zheng, Hideki Imai
PublisherSpringer Verlag
Pages164-181
Number of pages18
ISBN (Print)3540646930, 9783540646938
DOIs
Publication statusPublished - Jan 1 1998
Event1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998 - Pacifico Yokohama, Japan
Duration: Feb 5 1998Feb 6 1998

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1431
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998
CountryJapan
CityPacifico Yokohama
Period2/5/982/6/98

Fingerprint

Cryptosystem
Cryptography
Curve
Jacobian Varieties
Discrete Logarithm Problem
Public key
Genus
Attack

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Sakai, Y., Sakurai, K., & Ishizuka, H. (1998). Secure hyperelliptic cryptosystems and their performance. In Y. Zheng, & H. Imai (Eds.), Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings (pp. 164-181). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1431). Springer Verlag. https://doi.org/10.1007/BFb0054023

Secure hyperelliptic cryptosystems and their performance. / Sakai, Yasuyuki; Sakurai, Kouichi; Ishizuka, Hirokazu.

Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. ed. / Yuliang Zheng; Hideki Imai. Springer Verlag, 1998. p. 164-181 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1431).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sakai, Y, Sakurai, K & Ishizuka, H 1998, Secure hyperelliptic cryptosystems and their performance. in Y Zheng & H Imai (eds), Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 1431, Springer Verlag, pp. 164-181, 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Pacifico Yokohama, Japan, 2/5/98. https://doi.org/10.1007/BFb0054023
Sakai Y, Sakurai K, Ishizuka H. Secure hyperelliptic cryptosystems and their performance. In Zheng Y, Imai H, editors, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Springer Verlag. 1998. p. 164-181. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/BFb0054023
Sakai, Yasuyuki ; Sakurai, Kouichi ; Ishizuka, Hirokazu. / Secure hyperelliptic cryptosystems and their performance. Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. editor / Yuliang Zheng ; Hideki Imai. Springer Verlag, 1998. pp. 164-181 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{d1b0599f72d0484fa5d862bcf634274b,
title = "Secure hyperelliptic cryptosystems and their performance",
abstract = "We investigate the discrete logarithm problem over jacobian varieties of hypereUiptic curves suitable for public-key cryptosysterns, and clarify practical advantages of hyperelliptic cryptosystems compared to the elliptic cryptosystems and to RSA. We focus on the curves defined over the ground field of characteristic 2, and we present hyperelliptic cryptosystems from the jacobian associated with curves[Formula Presented]of genus g=3 and 11, which are secure against the known attacks. We further discuss the efficiency in implementation of such secure hyperelliptic cryptosystems.",
author = "Yasuyuki Sakai and Kouichi Sakurai and Hirokazu Ishizuka",
year = "1998",
month = "1",
day = "1",
doi = "10.1007/BFb0054023",
language = "English",
isbn = "3540646930",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "164--181",
editor = "Yuliang Zheng and Hideki Imai",
booktitle = "Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings",
address = "Germany",

}

TY - GEN

T1 - Secure hyperelliptic cryptosystems and their performance

AU - Sakai, Yasuyuki

AU - Sakurai, Kouichi

AU - Ishizuka, Hirokazu

PY - 1998/1/1

Y1 - 1998/1/1

N2 - We investigate the discrete logarithm problem over jacobian varieties of hypereUiptic curves suitable for public-key cryptosysterns, and clarify practical advantages of hyperelliptic cryptosystems compared to the elliptic cryptosystems and to RSA. We focus on the curves defined over the ground field of characteristic 2, and we present hyperelliptic cryptosystems from the jacobian associated with curves[Formula Presented]of genus g=3 and 11, which are secure against the known attacks. We further discuss the efficiency in implementation of such secure hyperelliptic cryptosystems.

AB - We investigate the discrete logarithm problem over jacobian varieties of hypereUiptic curves suitable for public-key cryptosysterns, and clarify practical advantages of hyperelliptic cryptosystems compared to the elliptic cryptosystems and to RSA. We focus on the curves defined over the ground field of characteristic 2, and we present hyperelliptic cryptosystems from the jacobian associated with curves[Formula Presented]of genus g=3 and 11, which are secure against the known attacks. We further discuss the efficiency in implementation of such secure hyperelliptic cryptosystems.

UR - http://www.scopus.com/inward/record.url?scp=84958951306&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84958951306&partnerID=8YFLogxK

U2 - 10.1007/BFb0054023

DO - 10.1007/BFb0054023

M3 - Conference contribution

SN - 3540646930

SN - 9783540646938

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 164

EP - 181

BT - Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings

A2 - Zheng, Yuliang

A2 - Imai, Hideki

PB - Springer Verlag

ER -