SlideShare a Scribd company logo
Introduction Preparation Proposal Conclusion
Efficient Scalar Multiplication for
Ate Based Pairing over KSS Curve
of Embedding Degree 18
Md. Al-Amin Khandaker (Okayama University, Japan)
Yasuyuki Nogami (Okayama University, Japan)
Hwajeong Seo (Institute for Infocomm Research (I2R) - A Star)
Sylvain Duquesne (Université Rennes I, France)
Background
Introduction Preparation Proposal Conclusion
2
E
Finite field arithmetic: multiplication,
addition, subtraction, inversion,…
Group operation: point Add/
Double
Scalar Multiplication
Elliptic Curve
Cryptography
Pairing
Pairing
based
cryptography
• Pairing based cryptography
• Identity(ID)-based cryptography (Sakai et al. 2000)
• Group signature (Boneh et al. 2003)
Expensive Operation
Therefore we focus on
Scalar Multiplication
Higher
Complexity
Background
Introduction Preparation Proposal Conclusion
3
• Elliptic Curve over Finite Field
Fp : {0, 1, · · · , p 1}, +,
Fpk : {(a1, · · · , ak)|ai 2 Fp}, +,
Prime field
Extension Field
Fp
Fpk
• Elliptic curve over Fp
Group of rational points on the curve: 
E(x, y) : y2
= x3
+ ax + b, a, b 2 Fp
E(Fp)
E(Fp) : rOrder of
{P, 2P, · · · , [a]P, · · · , [r]P}, +,E(Fp):
P1
P2
lP1P2
P3 = P1 + P2
y 2 Fp
x2 Fp
vP1+P2
rational point
P3
embedding degree
#E(Fp)
[#E(Fp)]P}, +
Background
Introduction Preparation Proposal Conclusion
4
Pairing
G1
G2
order = r
P
Q
G3
order = r
E(Fp18 )
additive multiplicative
e(P, Q)
order = r
P 2 G1 ⇢ E(Fp)
Q 2 G2 ⇢ E(Fp18 )
r|#E(Fp)Let
Background
Introduction Preparation Proposal Conclusion
5
Pairing
G1
G2
order = r
P
Q
G3
order = r
E(Fp18 )
order = r
P 2 G1 ⇢ E(Fp)
Q 2 G2 ⇢ E(Fp18 )
r|#E(Fp)Let
[a]P =
a 1X
i=0
P
[b]Q =
b 1X
i=0
Q
Bilinearity
e(P, Q)ab
Background
• Kachisa-Schaefer-Scott (KSS) Curve
Paring friendly elliptic curve of k = 18
Introduction Preparation Proposal Conclusion
6
• Characteristics p, Frobenius trace t and order r is given
systematically by integer z
E : y2
= x3
+ b, (b 2 Fp, b 6= 0 and x, y 2 Fp18 )
r(z) = (z6
+ 37z3
+ 343)/343
p(z) = (z8
+ 5z7
+ 7z6
+ 37z5
+ 188z4
+259z3
+ 343z2
+ 1763z + 2401)/21
t(z) = (z4
+ 16z + 7)/7
8
:
6
:
4
Motivation
Introduction Preparation Proposal Conclusion
◆ Scalar Multiplication of EC defined over
here s is a natural number and
• Binary algorithm also required (n-1) ECD. n = bit
length of s.
• NAF, Sliding window reduces number of ECA.
• But they also need n-1 ECD.
7
[s]Q = Q + Q + · · · + Q
| {z }
s 1 times additions
Q 2 Fp18
Fp18
Motivation
Introduction Preparation Proposal Conclusion
◆ Scalar Multiplication of EC defined over
here s is a natural number and
• In practice bit long
• It means almost 376 ECD is required in
That is why we tried to make it efficient in KSS curve
8
[s]Q = Q + Q + · · · + Q
| {z }
s 1 times additions
Q 2 Fp18
Fp18
Fp18
n  377
Preparation
Preparation Proposal Conclusion
9
Construct extension field arithmetic operations by
towering.
Find good parameters in KSS curve.
Finally we need to find certain rational point in G2
G1 ⇥ G2 ! G3
Rational
point groups
Multiplicative
group
over
Fp18
Fp18
Getting Rational Point in G2
Proposal Conclusion
r + 1
r
[r]T = O
• Randomly obtained rational
point R
• If
• Then is the rational
point whose order
becomes r
T
• Using we can get certain rational
point in
T
G2
10
groups
order
[
#E(Fp18 )
r2
]R 6= O
P 2 G1 ⇢ E(Fp)
Q 2 E(Fp18 ) ⇢ G2
2 E(Fp18 )
• Check if
• Then belongs to
Getting Rational Point in G2
Proposal Conclusion
⇡p(Q) = [p]Q.
(⇡p [p])Q = O
• Frobenius mapping of , (⇡p 1)T = Q.
Q G2
T
11
Proposed Scalar Multiplication
Proposal Conclusion
• Let, is a scalar and is the Scalar Multiplication[s]Q
• Here 0 < s < r
• Taking mod ,
p ⌘ t 1 mod r
• From KSS- curve,
• -adic representation(t 1)
12
#E(Fp) = p + 1 t
S = SH(t 1) + SL
Higher bits Lower bits
s
r|#E(Fp)
#E(Fp) = p + 1 t ⌘ 0 mod rr
s
Proposed Scalar Multiplication
Proposal Conclusion
13
(t 1)
| {z } | {z }
SH SL
s = SH(t 1) + SL
• -adic representation(t 1) S = SH(t 1) + SL
• will be nearly equal to the size of (t − 1)SL
• will be half size of (t − 1)SH
s
8
:
6
:
4
Proposed Scalar Multiplication
Proposal Conclusion
14
s5 s4 s3 s2 s1 s0
z3
z2 zz
(t 1)
| {z } | {z }
SH SL
1 1
• Let’s consider z-adic representation of andSL SH
s = SH(t 1) + SL = (s5z + s4)(t 1) + (s3z3
+ s2z2
+ s1z + s0)
• z is the mother parameters of KSS curve properties
• z is about 1/4 of that of (t−1)
Proposed Scalar Multiplication
Proposal Conclusion
15
• Final representation of s with 6 coefficients
Consider multiplication of s with Q
[s]Q = (s0 + s1z)Q + (s2 + s3z)z2
Q + (s4 + s5z)(t 1)Q
s = (s0 + s1z) + (s2 + s3z)z2
+ (s4 + s5z)(t 1)
Proposed Scalar Multiplication
Proposal Conclusion
16
Let = and =
[s]Q = (s0Q + s2Q1 + s4Q2)
+(s1z(Q) + s3z(Q1) + s5z(Q2))
[s]Q = (s0 + s1z)Q + (s2 + s3z)z2
Q + (s4 + s5z)(t 1)Q
[s]Q = (s0 + s1z)Q + (s2 + s3z)Q1 + (s4 + s5z)Q2
Proposed Scalar Multiplication
Proposal Conclusion
17
13 Precomputed Points
• Using
[s]Q = (s0Q + s2Q1 + s4Q2)
+(s1z(Q) + s3z(Q1) + s5z(Q2))
Example of Previous Scalar Multiplication
Proposal Conclusion
1 2 3 4 5 6 7 42
S 1 0 1 1 0 1 1 … 1
(Q) 2(2(2(Q))+Q)+Q
18
• Let, is a scalar and is the Scalar MultiplicationS [S]Q
Let S is 42 bit
2(2(Q))+Q2(Q)
Example of Previous Scalar Multiplication
Proposal Conclusion
1 2 3 4 5 6 7 42
S 1 0 1 1 0 1 1 … 1
2(2(2(Q))+Q)+Q
19
• Let, is a scalar and is the Scalar MultiplicationS [S]Q
Let S is 42 bit
41 times ECD, which is about the size of S
Example of Efficient Scalar Multiplication
Proposal Conclusion
20
s1z + s0
s3z + s2
s5z + s4
1
0
1
< z(Q) + z(Q2) > < Q + Q1 + Q2 >
1
1
1
s1
s3
s5
s0
s2
s4
= 1 0 1 1 0 0 1
= 0 1 1 1 0 1 0
= 1 1 0 1 0 0 0
= 1 1 0 1 1 0 1
= 1 0 0 0 0 0 0
= 1 0 1 1 0 0 0
Example of Efficient Scalar Multiplication
Proposal Conclusion
21
s1z + s0
s3z + s2
s5z + s4
0
1
1
1
0
0
s1
s3
s5
s0
s2
s4
= 1 0 1 1 0 0 1
= 0 1 1 1 0 1 0
= 1 1 0 1 0 0 0
= 1 1 0 1 1 0 1
= 1 0 0 0 0 0 0
= 1 0 1 1 0 0 0
< z(Q1) + z(Q2) > < Q >
Example of Efficient Scalar Multiplication
Proposal Conclusion
22
s1z + s0
s3z + s2
s5z + s4
1
1
0
0
0
1
s1
s3
s5
s0
s2
s4
= 1 0 1 1 0 0 1
= 0 1 1 1 0 1 0
= 1 1 0 1 0 0 0
= 1 1 0 1 1 0 1
= 1 0 0 0 0 0 0
= 1 0 1 1 0 0 0
< z(Q) + z(Q1) > < Q2 >
Example of Efficient Scalar Multiplication
Proposal Conclusion
23
s1z + s0
s3z + s2
s5z + s4
1
1
1
1
0
1
s1
s3
s5
s0
s2
s4
= 1 0 1 1 0 0 1
= 0 1 1 1 0 1 0
= 1 1 0 1 0 0 0
= 1 1 0 1 1 0 1
= 1 0 0 0 0 0 0
= 1 0 1 1 0 0 0
< z(Q) + z(Q1) + z(Q2) > < Q + Q2 >
Example of Efficient Scalar Multiplication
Proposal Conclusion
24
s1z + s0
s3z + s2
s5z + s4
1
1
1
1
0
1
s1
s3
s5
s0
s2
s4
= 1 0 1 1 0 0 1
= 0 1 1 1 0 1 0
= 1 1 0 1 0 0 0
= 1 1 0 1 1 0 1
= 1 0 0 0 0 0 0
= 1 0 1 1 0 0 0
< z(Q) + z(Q1) + z(Q2) > < Q + Q2 >
represent the ECD
6 ECD is required
Result Evaluation
Proposal Conclusion
25
Experiment Parameters
KSS curve
s
Mother parameter
Prime number
Order
trace
500 random scalar (about 377bit )
Result Evaluation
Proposal Conclusion
CPU* Memory OS Compiler
Programm
ing
Language
Library
PC
2.7Ghz
Intel Core
i5
16 GB
Mac OS X
10.11.4
gcc 4.2.1
C
GMP
6.1.1
iPhone 6s
Apple A9
Dual-core
1.84 GHz
2 GB iOS 9.3.1 gcc 4.2.1
Objective-
C, C
GMP
6.1.1
26
Experiment environment settings
*Single core is utilized
Result Evaluation
Proposal Conclusion
27
ECD is about 6 times less of total bit size of scalar
Operation Count and Execution time comparison
Conclusion
Conclusion
Our proposed approach reduces the number of
ECD by 6 times of existing approaches in KSS curve
Future work
• Reduce the execution time and operation complexity by
Skew Frobenius mapping in sextic twisted isomorphic
curve.
• Test and evaluate the performance in Paring based
protocol implementation.
28
Thank you

More Related Content

PPTX
Aaex2 group2
PPT
1524 elliptic curve cryptography
PPTX
Row Pattern Matching 12c MATCH_RECOGNIZE OOW14
PPTX
Crystal Ball Event Prediction and Log Analysis with Hadoop MapReduce and Spark
PDF
Capítulo 05 deflexão e rigidez
PDF
Kmeans with canopy clustering
PPTX
Fp12_Efficient_SCM
PDF
Elliptic Curve Cryptography
Aaex2 group2
1524 elliptic curve cryptography
Row Pattern Matching 12c MATCH_RECOGNIZE OOW14
Crystal Ball Event Prediction and Log Analysis with Hadoop MapReduce and Spark
Capítulo 05 deflexão e rigidez
Kmeans with canopy clustering
Fp12_Efficient_SCM
Elliptic Curve Cryptography

What's hot (16)

PPTX
Make your data dance: PIVOT and GROUP BY in Oracle SQL
PDF
High-Performance Approach to String Similarity using Most Frequent K Characters
PDF
Understanding CTLE
PDF
[DL輪読会]近年のエネルギーベースモデルの進展
PDF
Iterative methods with special structures
PPTX
RBootcamp Day 4
PPTX
Gradient descent optimizer
PDF
Elliptic curve cryptography
PPSX
Make your data dance
PPT
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
PDF
Modeling and Querying Metadata in the Semantic Sensor Web: stRDF and stSPARQL
PDF
Oracle-based algorithms for high-dimensional polytopes.
PPTX
RBootcam Day 2
PPTX
Scaling out logistic regression with Spark
PDF
RGA of Cayley graphs
PDF
Practical and Worst-Case Efficient Apportionment
Make your data dance: PIVOT and GROUP BY in Oracle SQL
High-Performance Approach to String Similarity using Most Frequent K Characters
Understanding CTLE
[DL輪読会]近年のエネルギーベースモデルの進展
Iterative methods with special structures
RBootcamp Day 4
Gradient descent optimizer
Elliptic curve cryptography
Make your data dance
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Modeling and Querying Metadata in the Semantic Sensor Web: stRDF and stSPARQL
Oracle-based algorithms for high-dimensional polytopes.
RBootcam Day 2
Scaling out logistic regression with Spark
RGA of Cayley graphs
Practical and Worst-Case Efficient Apportionment
Ad

Viewers also liked (9)

PDF
Blind Source Separation of Super and Sub-Gaussian Signals with ABC Algorithm
PDF
PACRIM15_Presentation_iHaz
DOCX
High speed and energy-efficient carry skip adder operating under a wide range...
PPTX
Blind signal processing presentation
PPT
07f03 carryskip
DOCX
High performance pipelined architecture of elliptic curve scalar multiplicati...
PPT
DIT-Radix-2-FFT in SPED
PPTX
Radix 4 FFT algorithm and it time complexity computation
PDF
easy elliptic curve(椭圆曲线算法解释)
Blind Source Separation of Super and Sub-Gaussian Signals with ABC Algorithm
PACRIM15_Presentation_iHaz
High speed and energy-efficient carry skip adder operating under a wide range...
Blind signal processing presentation
07f03 carryskip
High performance pipelined architecture of elliptic curve scalar multiplicati...
DIT-Radix-2-FFT in SPED
Radix 4 FFT algorithm and it time complexity computation
easy elliptic curve(椭圆曲线算法解释)
Ad

Similar to Efficient Scalar Multiplication for Ate Based Pairing over KSS Curve of Embedding Degree 18 (20)

PPTX
Elliptic Curve Cryptography
PPT
factoring
PDF
Introduction to Polyhedral Compilation
PPT
555_Spring12_topic06.ppt
PPTX
DS Unit-1.pptx very easy to understand..
PDF
Chap7 2 Ecc Intro
PDF
Quantum factorization.pdf
PDF
2018 MUMS Fall Course - Sampling-based techniques for uncertainty propagation...
PDF
Understanding Reed-Solomon code
PPTX
cse couse aefrfrqewrbqwrgbqgvq2w3vqbvq23rbgw3rnw345
PPT
Lect no 13 ECC.ppt
PPT
Lect no 13 ECC.ppt
ODP
parameterized complexity for graph Motif
PDF
Rosser's theorem
PDF
Solving integral equations on boundaries with corners, edges, and nearly sing...
PDF
Number Theory and Its Applications in Cryptography
PDF
Sistemas de control para ingenieria 3ra edicion norman s. nise sol
PPT
Chapter No. 8 Root Locus of control System
PDF
chapter 7 control system engineering.pdf
Elliptic Curve Cryptography
factoring
Introduction to Polyhedral Compilation
555_Spring12_topic06.ppt
DS Unit-1.pptx very easy to understand..
Chap7 2 Ecc Intro
Quantum factorization.pdf
2018 MUMS Fall Course - Sampling-based techniques for uncertainty propagation...
Understanding Reed-Solomon code
cse couse aefrfrqewrbqwrgbqgvq2w3vqbvq23rbgw3rnw345
Lect no 13 ECC.ppt
Lect no 13 ECC.ppt
parameterized complexity for graph Motif
Rosser's theorem
Solving integral equations on boundaries with corners, edges, and nearly sing...
Number Theory and Its Applications in Cryptography
Sistemas de control para ingenieria 3ra edicion norman s. nise sol
Chapter No. 8 Root Locus of control System
chapter 7 control system engineering.pdf

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
cuic standard and advanced reporting.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
“AI and Expert System Decision Support & Business Intelligence Systems”
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
cuic standard and advanced reporting.pdf
Understanding_Digital_Forensics_Presentation.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Big Data Technologies - Introduction.pptx
Encapsulation theory and applications.pdf
Machine learning based COVID-19 study performance prediction
Digital-Transformation-Roadmap-for-Companies.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation_ Review paper, used for researhc scholars
Chapter 3 Spatial Domain Image Processing.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Advanced methodologies resolving dimensionality complications for autism neur...

Efficient Scalar Multiplication for Ate Based Pairing over KSS Curve of Embedding Degree 18

  • 1. Introduction Preparation Proposal Conclusion Efficient Scalar Multiplication for Ate Based Pairing over KSS Curve of Embedding Degree 18 Md. Al-Amin Khandaker (Okayama University, Japan) Yasuyuki Nogami (Okayama University, Japan) Hwajeong Seo (Institute for Infocomm Research (I2R) - A Star) Sylvain Duquesne (Université Rennes I, France)
  • 2. Background Introduction Preparation Proposal Conclusion 2 E Finite field arithmetic: multiplication, addition, subtraction, inversion,… Group operation: point Add/ Double Scalar Multiplication Elliptic Curve Cryptography Pairing Pairing based cryptography • Pairing based cryptography • Identity(ID)-based cryptography (Sakai et al. 2000) • Group signature (Boneh et al. 2003) Expensive Operation Therefore we focus on Scalar Multiplication Higher Complexity
  • 3. Background Introduction Preparation Proposal Conclusion 3 • Elliptic Curve over Finite Field Fp : {0, 1, · · · , p 1}, +, Fpk : {(a1, · · · , ak)|ai 2 Fp}, +, Prime field Extension Field Fp Fpk • Elliptic curve over Fp Group of rational points on the curve:  E(x, y) : y2 = x3 + ax + b, a, b 2 Fp E(Fp) E(Fp) : rOrder of {P, 2P, · · · , [a]P, · · · , [r]P}, +,E(Fp): P1 P2 lP1P2 P3 = P1 + P2 y 2 Fp x2 Fp vP1+P2 rational point P3 embedding degree #E(Fp) [#E(Fp)]P}, +
  • 4. Background Introduction Preparation Proposal Conclusion 4 Pairing G1 G2 order = r P Q G3 order = r E(Fp18 ) additive multiplicative e(P, Q) order = r P 2 G1 ⇢ E(Fp) Q 2 G2 ⇢ E(Fp18 ) r|#E(Fp)Let
  • 5. Background Introduction Preparation Proposal Conclusion 5 Pairing G1 G2 order = r P Q G3 order = r E(Fp18 ) order = r P 2 G1 ⇢ E(Fp) Q 2 G2 ⇢ E(Fp18 ) r|#E(Fp)Let [a]P = a 1X i=0 P [b]Q = b 1X i=0 Q Bilinearity e(P, Q)ab
  • 6. Background • Kachisa-Schaefer-Scott (KSS) Curve Paring friendly elliptic curve of k = 18 Introduction Preparation Proposal Conclusion 6 • Characteristics p, Frobenius trace t and order r is given systematically by integer z E : y2 = x3 + b, (b 2 Fp, b 6= 0 and x, y 2 Fp18 ) r(z) = (z6 + 37z3 + 343)/343 p(z) = (z8 + 5z7 + 7z6 + 37z5 + 188z4 +259z3 + 343z2 + 1763z + 2401)/21 t(z) = (z4 + 16z + 7)/7 8 : 6 : 4
  • 7. Motivation Introduction Preparation Proposal Conclusion ◆ Scalar Multiplication of EC defined over here s is a natural number and • Binary algorithm also required (n-1) ECD. n = bit length of s. • NAF, Sliding window reduces number of ECA. • But they also need n-1 ECD. 7 [s]Q = Q + Q + · · · + Q | {z } s 1 times additions Q 2 Fp18 Fp18
  • 8. Motivation Introduction Preparation Proposal Conclusion ◆ Scalar Multiplication of EC defined over here s is a natural number and • In practice bit long • It means almost 376 ECD is required in That is why we tried to make it efficient in KSS curve 8 [s]Q = Q + Q + · · · + Q | {z } s 1 times additions Q 2 Fp18 Fp18 Fp18 n  377
  • 9. Preparation Preparation Proposal Conclusion 9 Construct extension field arithmetic operations by towering. Find good parameters in KSS curve. Finally we need to find certain rational point in G2 G1 ⇥ G2 ! G3 Rational point groups Multiplicative group over Fp18 Fp18
  • 10. Getting Rational Point in G2 Proposal Conclusion r + 1 r [r]T = O • Randomly obtained rational point R • If • Then is the rational point whose order becomes r T • Using we can get certain rational point in T G2 10 groups order [ #E(Fp18 ) r2 ]R 6= O P 2 G1 ⇢ E(Fp) Q 2 E(Fp18 ) ⇢ G2 2 E(Fp18 )
  • 11. • Check if • Then belongs to Getting Rational Point in G2 Proposal Conclusion ⇡p(Q) = [p]Q. (⇡p [p])Q = O • Frobenius mapping of , (⇡p 1)T = Q. Q G2 T 11
  • 12. Proposed Scalar Multiplication Proposal Conclusion • Let, is a scalar and is the Scalar Multiplication[s]Q • Here 0 < s < r • Taking mod , p ⌘ t 1 mod r • From KSS- curve, • -adic representation(t 1) 12 #E(Fp) = p + 1 t S = SH(t 1) + SL Higher bits Lower bits s r|#E(Fp) #E(Fp) = p + 1 t ⌘ 0 mod rr s
  • 13. Proposed Scalar Multiplication Proposal Conclusion 13 (t 1) | {z } | {z } SH SL s = SH(t 1) + SL • -adic representation(t 1) S = SH(t 1) + SL • will be nearly equal to the size of (t − 1)SL • will be half size of (t − 1)SH s 8 : 6 : 4
  • 14. Proposed Scalar Multiplication Proposal Conclusion 14 s5 s4 s3 s2 s1 s0 z3 z2 zz (t 1) | {z } | {z } SH SL 1 1 • Let’s consider z-adic representation of andSL SH s = SH(t 1) + SL = (s5z + s4)(t 1) + (s3z3 + s2z2 + s1z + s0) • z is the mother parameters of KSS curve properties • z is about 1/4 of that of (t−1)
  • 15. Proposed Scalar Multiplication Proposal Conclusion 15 • Final representation of s with 6 coefficients Consider multiplication of s with Q [s]Q = (s0 + s1z)Q + (s2 + s3z)z2 Q + (s4 + s5z)(t 1)Q s = (s0 + s1z) + (s2 + s3z)z2 + (s4 + s5z)(t 1)
  • 16. Proposed Scalar Multiplication Proposal Conclusion 16 Let = and = [s]Q = (s0Q + s2Q1 + s4Q2) +(s1z(Q) + s3z(Q1) + s5z(Q2)) [s]Q = (s0 + s1z)Q + (s2 + s3z)z2 Q + (s4 + s5z)(t 1)Q [s]Q = (s0 + s1z)Q + (s2 + s3z)Q1 + (s4 + s5z)Q2
  • 17. Proposed Scalar Multiplication Proposal Conclusion 17 13 Precomputed Points • Using [s]Q = (s0Q + s2Q1 + s4Q2) +(s1z(Q) + s3z(Q1) + s5z(Q2))
  • 18. Example of Previous Scalar Multiplication Proposal Conclusion 1 2 3 4 5 6 7 42 S 1 0 1 1 0 1 1 … 1 (Q) 2(2(2(Q))+Q)+Q 18 • Let, is a scalar and is the Scalar MultiplicationS [S]Q Let S is 42 bit 2(2(Q))+Q2(Q)
  • 19. Example of Previous Scalar Multiplication Proposal Conclusion 1 2 3 4 5 6 7 42 S 1 0 1 1 0 1 1 … 1 2(2(2(Q))+Q)+Q 19 • Let, is a scalar and is the Scalar MultiplicationS [S]Q Let S is 42 bit 41 times ECD, which is about the size of S
  • 20. Example of Efficient Scalar Multiplication Proposal Conclusion 20 s1z + s0 s3z + s2 s5z + s4 1 0 1 < z(Q) + z(Q2) > < Q + Q1 + Q2 > 1 1 1 s1 s3 s5 s0 s2 s4 = 1 0 1 1 0 0 1 = 0 1 1 1 0 1 0 = 1 1 0 1 0 0 0 = 1 1 0 1 1 0 1 = 1 0 0 0 0 0 0 = 1 0 1 1 0 0 0
  • 21. Example of Efficient Scalar Multiplication Proposal Conclusion 21 s1z + s0 s3z + s2 s5z + s4 0 1 1 1 0 0 s1 s3 s5 s0 s2 s4 = 1 0 1 1 0 0 1 = 0 1 1 1 0 1 0 = 1 1 0 1 0 0 0 = 1 1 0 1 1 0 1 = 1 0 0 0 0 0 0 = 1 0 1 1 0 0 0 < z(Q1) + z(Q2) > < Q >
  • 22. Example of Efficient Scalar Multiplication Proposal Conclusion 22 s1z + s0 s3z + s2 s5z + s4 1 1 0 0 0 1 s1 s3 s5 s0 s2 s4 = 1 0 1 1 0 0 1 = 0 1 1 1 0 1 0 = 1 1 0 1 0 0 0 = 1 1 0 1 1 0 1 = 1 0 0 0 0 0 0 = 1 0 1 1 0 0 0 < z(Q) + z(Q1) > < Q2 >
  • 23. Example of Efficient Scalar Multiplication Proposal Conclusion 23 s1z + s0 s3z + s2 s5z + s4 1 1 1 1 0 1 s1 s3 s5 s0 s2 s4 = 1 0 1 1 0 0 1 = 0 1 1 1 0 1 0 = 1 1 0 1 0 0 0 = 1 1 0 1 1 0 1 = 1 0 0 0 0 0 0 = 1 0 1 1 0 0 0 < z(Q) + z(Q1) + z(Q2) > < Q + Q2 >
  • 24. Example of Efficient Scalar Multiplication Proposal Conclusion 24 s1z + s0 s3z + s2 s5z + s4 1 1 1 1 0 1 s1 s3 s5 s0 s2 s4 = 1 0 1 1 0 0 1 = 0 1 1 1 0 1 0 = 1 1 0 1 0 0 0 = 1 1 0 1 1 0 1 = 1 0 0 0 0 0 0 = 1 0 1 1 0 0 0 < z(Q) + z(Q1) + z(Q2) > < Q + Q2 > represent the ECD 6 ECD is required
  • 25. Result Evaluation Proposal Conclusion 25 Experiment Parameters KSS curve s Mother parameter Prime number Order trace 500 random scalar (about 377bit )
  • 26. Result Evaluation Proposal Conclusion CPU* Memory OS Compiler Programm ing Language Library PC 2.7Ghz Intel Core i5 16 GB Mac OS X 10.11.4 gcc 4.2.1 C GMP 6.1.1 iPhone 6s Apple A9 Dual-core 1.84 GHz 2 GB iOS 9.3.1 gcc 4.2.1 Objective- C, C GMP 6.1.1 26 Experiment environment settings *Single core is utilized
  • 27. Result Evaluation Proposal Conclusion 27 ECD is about 6 times less of total bit size of scalar Operation Count and Execution time comparison
  • 28. Conclusion Conclusion Our proposed approach reduces the number of ECD by 6 times of existing approaches in KSS curve Future work • Reduce the execution time and operation complexity by Skew Frobenius mapping in sextic twisted isomorphic curve. • Test and evaluate the performance in Paring based protocol implementation. 28