[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Models of Curves from GHS Attack in Odd Characteristic

  • Conference paper
Information Security Practice and Experience (ISPEC 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9065))

  • 1639 Accesses

Abstract

The idea behind the GHS attack is to transform the discrete logarithm problem(DLP) in the Jacobian of a (hyper-)elliptic curve over an extension field into DLPs in Jacobians of covering curves over the base field. Diem gives a condition under which explicit defining equations for some coverings are computed. In this paper, we show that his method works without that condition. We also give explicit map from the covering to the original curve if the covering is hyperelliptic. Our method is based on a formula for the embedding of rational subfield of the function field of (hyper)elliptic curve in that of the hyperelliptic covering.

This work is supported in part by National Research Foundation of China under Grant No. 61272040, 61379137, and in part by National Basic Research Program of China (973) under Grant No. 2013CB338001.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Diem, C.: The GHS attack in odd characteristic. J. Ramanujan Math. Soc. 18(1), 1–32 (2003)

    MathSciNet  MATH  Google Scholar 

  2. Diem, C.: An index calculus algorithm for plane curves of small degree. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol. 4076, pp. 543–557. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Diem, C., Kochinke, S.: Computing discrete logarithms with special linear systems, available under http://www.math.uni-leipzig.de/MI/diem/preprints/dlp-linear-systems.pdf

  4. Gaudry, P., Hess, F., Smart, N.P.: Constructive and destructive facets of Weil descent on elliptic curves. Journal of Cryptology 15(1), 19–46 (2002)

    Article  MathSciNet  Google Scholar 

  5. Gaudry, P., Thomé, E., Thériault, N., Diem, C.: A double large prime variation for small genus hyperelliptic index calculus. Mathematics of Computation 76(257), 475–492 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  6. Joux, A., Vitse, V.: Cover and Decomposition Index Calculus on Elliptic Curves Made Practical. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 9–26. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  7. Kani, E., Rosen, M.: Idempotent relations and factors of Jacobians. Mathematische Annalen 284(2), 307–327 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  8. Kuhn, R.M.: Curves of genus 2 with split Jacobian. Transactions of the American Mathematical Society 307(1), 41–49 (1988)

    MathSciNet  MATH  Google Scholar 

  9. Lang, S.: Algebra, revised 3rd edn. Springer (2002)

    Google Scholar 

  10. Thériault, N.: Weil descent attack for Kummer extensions. J. Ramanujan Math. Soc. 18(3), 281–312 (2003)

    MathSciNet  MATH  Google Scholar 

  11. Waterhouse, W.C., Milne, J.: Abelian varieties over finite fields. Ann. Sci. École Norm. Sup. 2(4), 521–560 (1969)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Song Tian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Tian, S., Yu, W., Li, B., Wang, K. (2015). Models of Curves from GHS Attack in Odd Characteristic. In: Lopez, J., Wu, Y. (eds) Information Security Practice and Experience. ISPEC 2015. Lecture Notes in Computer Science(), vol 9065. Springer, Cham. https://doi.org/10.1007/978-3-319-17533-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-17533-1_12

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-17532-4

  • Online ISBN: 978-3-319-17533-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics