Skip to main content

Efficient Construction of Cryptographically Strong Elliptic Curves

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1977))

Abstract

We present a very efficient algorithm which given a negative integer Δ, Δ ≡ 1 mod 8,Δ not divisible by 3, finds a prime number p and a cryptographically strong elliptic curve E over the prime field IFp whose endomorphism ring is the quadratic order O of discriminant Δ. Our algorithm bases on a variant of the complex multiplication method using Weber functions. We depict our very efficient method to find suitable primes for this method. Furthermore, we show that our algorithm is feasible in reasonable time even for orders O whose class number is in the range 200 up to 1000.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A.O.L. Atkin and F. Morain. Elliptic curves and primality proving. Mathematics of Computation, 61:29–67, 1993. 191, 192, 194

    Article  MATH  MathSciNet  Google Scholar 

  2. T.M. Apostol. Modular Functions and Dirichlet Series in Number Theory. Springer-Verlag, 1990. 194

    Google Scholar 

  3. I. Blake, G. Seroussi, and N. Smart. Elliptic Curves in Cryptography. Cambridge University Press, 1999. 194

    Google Scholar 

  4. H. Cohen. A Course in Computational Algebraic Number Theory. Springer-Verlag, 1995. 198, 199

    Google Scholar 

  5. Standard Specifications For Public-Key Cryptography. available via WWW from http://grouper.ieee.org/groups/1363/. 191

  6. A library for computational number theory. Technical University of Darmstadt. available via WWW from http://www.informatik.tudarmstadt. de/TI/LiDIA/Welcome.html. 199

  7. G.-J. Lay and H.G. Zimmer. Constructing elliptic curves with given group order over large finite fields. In Proceedings of ANTS I, LNCS 877, pages 250–263, 1994. 191, 192, 199

    Google Scholar 

  8. A. Menezes, T. Okamoto, and S. Vanstone. Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field. In Proceedings of the 23rd Annual ACM Symposium on the Theory of Computing, pages 80–89, 1991. 193

    Google Scholar 

  9. V. Müller and S. Paulus. On the Generation of Cryptographically Strong Elliptic Curves. Technical Report, Technical University of Darmstadt, 1997. 191

    Google Scholar 

  10. V. Shoup. A new polynomial factorization algorithm and its implementation. Journal of Symbolic Computation, 20:363–397, 1995. 199

    Article  MATH  MathSciNet  Google Scholar 

  11. N.P. Smart. The Discrete Logarithm Problem on Elliptic Curves of Trace One. Journal of Cryptology, 12/3:193–196, 1999. 193

    Article  MathSciNet  Google Scholar 

  12. P.C. van Oorschot and M.J. Wiener. Parallel Collision Search with Cryptanalytic Applications. Journal of Cryptology, 12/1:1–28, 1999. 193

    Article  Google Scholar 

  13. H. Weber. Lehrbuch der Algebra III. Chelsea Publishing Company, 1902. 198

    Google Scholar 

  14. N. Yui and D. Zagier. On the singular values of Weber modular functions. Mathematics of Computation, 66:1645–1662, 1997. 192, 197

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Buchmann, J., Baier, H. (2000). Efficient Construction of Cryptographically Strong Elliptic Curves. In: Roy, B., Okamoto, E. (eds) Progress in Cryptology —INDOCRYPT 2000. INDOCRYPT 2000. Lecture Notes in Computer Science, vol 1977. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44495-5_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-44495-5_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41452-0

  • Online ISBN: 978-3-540-44495-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics