Abstract
The idea behind the GHS attack is to transform the discrete logarithm problem(DLP) in the Jacobian of a (hyper-)elliptic curve over an extension field into DLPs in Jacobians of covering curves over the base field. Diem gives a condition under which explicit defining equations for some coverings are computed. In this paper, we show that his method works without that condition. We also give explicit map from the covering to the original curve if the covering is hyperelliptic. Our method is based on a formula for the embedding of rational subfield of the function field of (hyper)elliptic curve in that of the hyperelliptic covering.
This work is supported in part by National Research Foundation of China under Grant No. 61272040, 61379137, and in part by National Basic Research Program of China (973) under Grant No. 2013CB338001.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Diem, C.: The GHS attack in odd characteristic. J. Ramanujan Math. Soc. 18(1), 1–32 (2003)
Diem, C.: An index calculus algorithm for plane curves of small degree. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol. 4076, pp. 543–557. Springer, Heidelberg (2006)
Diem, C., Kochinke, S.: Computing discrete logarithms with special linear systems, available under http://www.math.uni-leipzig.de/MI/diem/preprints/dlp-linear-systems.pdf
Gaudry, P., Hess, F., Smart, N.P.: Constructive and destructive facets of Weil descent on elliptic curves. Journal of Cryptology 15(1), 19–46 (2002)
Gaudry, P., Thomé, E., Thériault, N., Diem, C.: A double large prime variation for small genus hyperelliptic index calculus. Mathematics of Computation 76(257), 475–492 (2007)
Joux, A., Vitse, V.: Cover and Decomposition Index Calculus on Elliptic Curves Made Practical. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 9–26. Springer, Heidelberg (2012)
Kani, E., Rosen, M.: Idempotent relations and factors of Jacobians. Mathematische Annalen 284(2), 307–327 (1989)
Kuhn, R.M.: Curves of genus 2 with split Jacobian. Transactions of the American Mathematical Society 307(1), 41–49 (1988)
Lang, S.: Algebra, revised 3rd edn. Springer (2002)
Thériault, N.: Weil descent attack for Kummer extensions. J. Ramanujan Math. Soc. 18(3), 281–312 (2003)
Waterhouse, W.C., Milne, J.: Abelian varieties over finite fields. Ann. Sci. École Norm. Sup. 2(4), 521–560 (1969)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Tian, S., Yu, W., Li, B., Wang, K. (2015). Models of Curves from GHS Attack in Odd Characteristic. In: Lopez, J., Wu, Y. (eds) Information Security Practice and Experience. ISPEC 2015. Lecture Notes in Computer Science(), vol 9065. Springer, Cham. https://doi.org/10.1007/978-3-319-17533-1_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-17533-1_12
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-17532-4
Online ISBN: 978-3-319-17533-1
eBook Packages: Computer ScienceComputer Science (R0)