Skip to main content

Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11547))

Included in the following conference series:

  • 1178 Accesses

Abstract

Elliptic curves and hyperelliptic curves over finite fields are of great interest in public key cryptography. Using much smaller field for same security makes the genus 2 curves more competitive than elliptic curves. However, point counting algorithms for the Jacobians of genus 2 curves are not as efficient as what we have for elliptic curves. We give a method to generate genus 2 curves for which the point counting problems can be easily solved with efficient algorithms for elliptic curves. As an application, an example of a hyperelliptic curve whose order is a 256-bit prime is given. The method relies on the construction of a cover map from a hyperelliptic curve to an elliptic curve. Another important application of the construction is to generate the cover for the cover-decomposition attack on the discrete logarithm problems in elliptic curves.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cohen, H., et al.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press, Boca Raton (2005)

    Book  Google Scholar 

  2. Diem, C.: The GHS attack in odd characteristic. J. Ramanujan Math. Soc. 18(1), 1–32 (2003)

    MathSciNet  MATH  Google Scholar 

  3. Diem, C., Scholten, J.: Cover Attacks-a Report for the AREHCC Project. Preprint, October 2003

    Google Scholar 

  4. Frey, G., Rück, H.G.: A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Math. Comput. 62, 865–874 (1994)

    MathSciNet  MATH  Google Scholar 

  5. Galbraith, S.D., Gaudry, P.: Recent progress on the elliptic curve discrete logarithm problem. Des. Codes Cryptogr. 78(1), 51–72 (2016)

    Article  MathSciNet  Google Scholar 

  6. Koblitz, N.: Hyperelliptic cryptosystems. J. Cryptol. 1(3), 139–150 (1989)

    Article  MathSciNet  Google Scholar 

  7. Kuhn, R.M.: Curves of genus 2 with split Jacobian. Trans. Am. Math. Soc. 307(1), 41–49 (1988)

    MathSciNet  MATH  Google Scholar 

  8. Scholten, J.: Weil Restriction of an Elliptic Curve over a Quadratic Extension. Preprint (2003). http://homes.esat.kuleuven.be/~jscholte/weilres.pdf

  9. Schoof, R.: Counting points on elliptic curves over finite fields. J. Théor. Nombres Bordeaux 7(1), 219–254 (1995)

    Article  MathSciNet  Google Scholar 

  10. Tian, S., Li, B., Wang, K.P., Yu, W.: Cover attacks for elliptic curves with cofactor two. Des. Codes Cryptogr. 86, 1–18 (2018)

    Article  MathSciNet  Google Scholar 

  11. Satoh, T.: Generating genus two hyperelliptic curves over large characteristic finite fields. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 536–553. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01001-9_31

    Chapter  Google Scholar 

  12. Frey, G.: How to Disguise an elliptic curve (weil descent). In: Talk at the 2nd Elliptic Curve Cryptography Workshop (ECC) (1998)

    Google Scholar 

  13. Gaudry, P., Hess, F., Smart, N.P.: Constructive and destructive facets of weil descent on elliptic curves. J. Cryptol. 15(1), 19–46 (2002)

    Article  MathSciNet  Google Scholar 

  14. Nagao, K.: Decomposition attack for the Jacobian of a hyperelliptic curve over an extension field. In: Hanrot, G., Morain, F., Thomé, E. (eds.) ANTS 2010. LNCS, vol. 6197, pp. 285–300. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14518-6_23

    Chapter  Google Scholar 

  15. Joux, A., Vitse, V.: Cover and decomposition index calculus on elliptic curves made practical. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 9–26. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29011-4_3

    Chapter  Google Scholar 

  16. Pohlig, S., Hellman, M.: An improved algorithm for computing discrete logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inf. Theory 24, 106–110 (1978)

    Article  Google Scholar 

  17. Gaudry, P., Harley, R.: Counting points on hyperelliptic curves over finite fields. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 313–332. Springer, Heidelberg (2000). https://doi.org/10.1007/10722028_18

    Chapter  Google Scholar 

  18. Mumford, D.: Tata lectures on Theta II: Progress in Mathematics. Springer, Berlin (1984)

    Google Scholar 

Download references

Acknowledgement

We thank the anonymous reviewers for their helpful comments. This work was supported by the National Natural Science Foundation of China (No. 61802401, No. 61772515 and No. 61872442).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xuejun Fan or Song Tian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fan, X., Tian, S., Li, B., Li, W. (2019). Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields. In: Jang-Jaccard, J., Guo, F. (eds) Information Security and Privacy. ACISP 2019. Lecture Notes in Computer Science(), vol 11547. Springer, Cham. https://doi.org/10.1007/978-3-030-21548-4_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-21548-4_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-21547-7

  • Online ISBN: 978-3-030-21548-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics