Abstract
Elliptic curves and hyperelliptic curves over finite fields are of great interest in public key cryptography. Using much smaller field for same security makes the genus 2 curves more competitive than elliptic curves. However, point counting algorithms for the Jacobians of genus 2 curves are not as efficient as what we have for elliptic curves. We give a method to generate genus 2 curves for which the point counting problems can be easily solved with efficient algorithms for elliptic curves. As an application, an example of a hyperelliptic curve whose order is a 256-bit prime is given. The method relies on the construction of a cover map from a hyperelliptic curve to an elliptic curve. Another important application of the construction is to generate the cover for the cover-decomposition attack on the discrete logarithm problems in elliptic curves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cohen, H., et al.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press, Boca Raton (2005)
Diem, C.: The GHS attack in odd characteristic. J. Ramanujan Math. Soc. 18(1), 1–32 (2003)
Diem, C., Scholten, J.: Cover Attacks-a Report for the AREHCC Project. Preprint, October 2003
Frey, G., Rück, H.G.: A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Math. Comput. 62, 865–874 (1994)
Galbraith, S.D., Gaudry, P.: Recent progress on the elliptic curve discrete logarithm problem. Des. Codes Cryptogr. 78(1), 51–72 (2016)
Koblitz, N.: Hyperelliptic cryptosystems. J. Cryptol. 1(3), 139–150 (1989)
Kuhn, R.M.: Curves of genus 2 with split Jacobian. Trans. Am. Math. Soc. 307(1), 41–49 (1988)
Scholten, J.: Weil Restriction of an Elliptic Curve over a Quadratic Extension. Preprint (2003). http://homes.esat.kuleuven.be/~jscholte/weilres.pdf
Schoof, R.: Counting points on elliptic curves over finite fields. J. Théor. Nombres Bordeaux 7(1), 219–254 (1995)
Tian, S., Li, B., Wang, K.P., Yu, W.: Cover attacks for elliptic curves with cofactor two. Des. Codes Cryptogr. 86, 1–18 (2018)
Satoh, T.: Generating genus two hyperelliptic curves over large characteristic finite fields. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 536–553. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01001-9_31
Frey, G.: How to Disguise an elliptic curve (weil descent). In: Talk at the 2nd Elliptic Curve Cryptography Workshop (ECC) (1998)
Gaudry, P., Hess, F., Smart, N.P.: Constructive and destructive facets of weil descent on elliptic curves. J. Cryptol. 15(1), 19–46 (2002)
Nagao, K.: Decomposition attack for the Jacobian of a hyperelliptic curve over an extension field. In: Hanrot, G., Morain, F., Thomé, E. (eds.) ANTS 2010. LNCS, vol. 6197, pp. 285–300. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14518-6_23
Joux, A., Vitse, V.: Cover and decomposition index calculus on elliptic curves made practical. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 9–26. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29011-4_3
Pohlig, S., Hellman, M.: An improved algorithm for computing discrete logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inf. Theory 24, 106–110 (1978)
Gaudry, P., Harley, R.: Counting points on hyperelliptic curves over finite fields. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 313–332. Springer, Heidelberg (2000). https://doi.org/10.1007/10722028_18
Mumford, D.: Tata lectures on Theta II: Progress in Mathematics. Springer, Berlin (1984)
Acknowledgement
We thank the anonymous reviewers for their helpful comments. This work was supported by the National Natural Science Foundation of China (No. 61802401, No. 61772515 and No. 61872442).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Fan, X., Tian, S., Li, B., Li, W. (2019). Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields. In: Jang-Jaccard, J., Guo, F. (eds) Information Security and Privacy. ACISP 2019. Lecture Notes in Computer Science(), vol 11547. Springer, Cham. https://doi.org/10.1007/978-3-030-21548-4_35
Download citation
DOI: https://doi.org/10.1007/978-3-030-21548-4_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-21547-7
Online ISBN: 978-3-030-21548-4
eBook Packages: Computer ScienceComputer Science (R0)