Skip to main content

On the Construction of Prime Order Elliptic Curves

  • Conference paper
Progress in Cryptology - INDOCRYPT 2003 (INDOCRYPT 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2904))

Included in the following conference series:

Abstract

We consider a variant of the Complex Multiplication (CM) method for constructing elliptic curves (ECs) of prime order with additional security properties. Our variant uses Weber polynomials whose discriminant D is congruent to 3 (mod 8), and is based on a new transformation for converting roots of Weber polynomials to their Hilbert counterparts. We also present a new theoretical estimate of the bit precision required for the construction of the Weber polynomials for these values of D. We conduct a comparative experimental study investigating the time and bit precision of using Weber polynomials against the (typical) use of Hilbert polynomials. We further investigate the time efficiency of the new CM variant under four different implementations of a crucial step of the variant and demonstrate the superiority of two of them.

This work was partially supported by the IST Programme of EU under contracts no. IST-1999-14186 (ALCOM-FT) and no. IST-1999-12554 (ASPIS), and by the Human Potential Programme of EU under contract no. HPRN-CT-1999-00104 (AMORE).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atkin, A.O.L., Morain, F.: Elliptic curves and primality proving. Mathematics of Computation 61, 29–67 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  2. Baier, H., Buchmann, J.: Efficient construction of cryptographically strong elliptic curves. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 191–202. Springer, Heidelberg (2000)

    Google Scholar 

  3. Baier, H.: Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography. In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol. 2247, pp. 99–107. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Baier, H.: Efficient Algorithms for Generating Elliptic Curves over Finite Fields Suitable for Use in Cryptography, PhD Thesis, Dept. of Computer Science, Technical Univ. of Darmstadt (May 2002)

    Google Scholar 

  5. Blake, I., Seroussi, G., Smart, N.: Elliptic curves in cryptography. London Mathematical Society Lecture Note Series, vol. 265. Cambridge Univ. Press, Cambridge (1999)

    MATH  Google Scholar 

  6. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Cohen, H.: A Course in Computational Algebraic Number Theory. Graduate Texts in Mathematics, vol. 138. Springer, Berlin (1993)

    MATH  Google Scholar 

  8. Cornacchia, G.: Su di un metodo per la risoluzione in numeri interi dell’ equazione \({\sum^n_{h=0}}\)Ch x n − h y h = P. Giornale di Matematiche di Battaglini 46, 33–90 (1908)

    Google Scholar 

  9. Enge, A., Morain, F.: Comparing Invariants for Class Fields of Imaginary Quadratic Fields. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 252–266. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  10. GNU multiple precision library, edition 3.1.1 (September 2000), Available at http://www.swox.com/gmp

  11. Gura, N., Eberle, H., Shantz, S.C.: Generic Implementations of Elliptic Curve Cryptography using Partial Reduction. In: Proc. 9th ACM Conf. on Computer and Communications Security - CCS 2002, pp. 108–116 (2002)

    Google Scholar 

  12. Herzberg, A., Jakobsson, M., Jarecki, S., Krawczyk, H., Yung, M.: Proactive Public Key and Signature Systems. In: Proc. 4th ACM Conf. on Computer and Communications Security - CCS 1997, pp. 100–110 (1997)

    Google Scholar 

  13. IEEE P1363/D13, Standard Specifications for Public-Key Cryptography (1999), http://grouper.ieee.org/groups/1363/tradPK/draft.html

  14. LiDIA. A library for computational number theory, Technical University of Darmstadt, Available from http://www.informatik.tu-darmstadt.de/TI/LiDIA/Welcome.html

  15. Kaltofen, E., Valente, T., Yui, N.: An Improved Las Vegas Primality Test. In: Proc. ACM-SIGSAM 1989 International Symposium on Symbolic and Algebraic Computation, pp. 26–33 (1989)

    Google Scholar 

  16. Kaltofen, E., Yui, N.: Explicit construction of the Hilbert class fields of imaginary quadratic fields by integer lattice reduction. Research Report 89-13, Renseelaer Polytechnic Institute (May 1989)

    Google Scholar 

  17. Konstantinou, E., Stamatiou, Y., Zaroliagis, C.: On the Efficient Generation of Elliptic Curves over Prime Fields. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 333–348. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  18. Lay, G.J., Zimmer, H.: Constructing Elliptic Curves with Given Group Order over Large Finite Fields. In: Huang, M.-D.A., Adleman, L.M. (eds.) ANTS 1994. LNCS, vol. 877, pp. 250–263. Springer, Heidelberg (1994)

    Google Scholar 

  19. Morain, F.: Building Cyclic Elliptic Curves Modulo Large Primes. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 328–336. Springer, Heidelberg (1991)

    Google Scholar 

  20. Müller, V., Paulus, S.: On the Generation of Cryptographically Strong Elliptic Curves, preprint (1997)

    Google Scholar 

  21. Nogami, Y., Morikawa, Y.: Fast generation of elliptic curves with prime order over \(F_{p^{2^c}}\) In: Proc. of the International workshop on Coding and Cryptography (March 2003)

    Google Scholar 

  22. Savaş, E., Schmidt, T.A., Koç, Ç.K.: Generating Elliptic Curves of Prime Order. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 145–161. Springer, Heidelberg (2001)

    Google Scholar 

  23. Silverman, J.H.: The Arithmetic of Elliptic Curves. Springer, GTM 106 (1986)

    MATH  Google Scholar 

  24. Spallek, A.-M.: Konstruktion einer elliptischen Kurve über einem endlichen Körper zu gegebener Punktegruppe, Master Thesis, Universität GH Essen (1992)

    Google Scholar 

  25. Valente, T.: A distributed approach to proving large numbers prime, Rensselaer Polytechnic Institute Troy, New York, PhD Thesis (August 1992)

    Google Scholar 

  26. Weng, A.: Konstruktion kryptographisch geeigneter Kurven mit komplexer Multi-plikation, PhD thesis, Institut für Experimentelle Mathematik, Universität GH Essen (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Konstantinou, E., Stamatiou, Y.C., Zaroliagis, C. (2003). On the Construction of Prime Order Elliptic Curves. In: Johansson, T., Maitra, S. (eds) Progress in Cryptology - INDOCRYPT 2003. INDOCRYPT 2003. Lecture Notes in Computer Science, vol 2904. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24582-7_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24582-7_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20609-5

  • Online ISBN: 978-3-540-24582-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics