Fixed argument pairing inversion on elliptic curves | Designs, Codes and Cryptography Skip to main content
Log in

Fixed argument pairing inversion on elliptic curves

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

Let \(E\) be an elliptic curve over a finite field \({\mathbb F}_q\) with a power of prime \(q,\,r\) a prime dividing \(\#E({\mathbb F}_q)\), and \(k\) the smallest positive integer satisfying \(r\,|\, q^k-1\), called embedding degree. Then a bilinear map \(t: E({\mathbb F}_{q^k})[r] \times E({\mathbb F}_{q^k})/rE({\mathbb F}_{q^k}) \rightarrow {\mathbb F}_{q^k}^*\) is defined, called the Tate pairing. The Ate pairing and other variants are obtained by reducing the domain for each argument and raising it to some power. In this paper we consider the Fixed Argument Pairing Inversion (FAPI) problem for the Tate pairing and its variants. In 2012, considering FAPI for the Ate\(_i\) pairing, Kanayama and Okamoto formulated the Exponentiation Inversion (EI) problem. However the definition gives a somewhat inaccurate description of the hardness of EI. We point out that the described EI can be easily solved, and hence give a repaired definition of EI so that the problem does contain the actual hardness in connection with the prescribed domain for given pairings. Next we show that inverting the Ate pairing (including other variants of the Tate pairing) defined on the smaller domain is neither easier nor harder than inverting the Tate pairing defined on the larger domain. This is interesting because the structure of the Ate pairing is so simple and good (that is, the Miller length is short, the solution domain is small and has an algebraic structure induced from the Frobenius map) that it looks more probable that attackers find further approach to solve FAPI for the Ate pairing, differently from the Tate pairing.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Adleman L.M., Manders K., Miller G.: On taking roots in finite field. In: Proceedings of 18th Annual Symposium on Foundations of Computer Science, pp. 175–178 (1977).

  2. Boneh D., Franklin M.: Identity-based encryption from the weil pairing. In: CRYPTO 2001. Lecture Notes in Computer Science, vol. 2139, pp. 213–229. Springer, Heidelberg (2001).

  3. Boneh D., Boyen X., Shacham H.: Short group signatures. In: Advances in CRYPTO 2004. Lecture Notes in Computer Science, vol. 3152, pp. 41–55. Springer, Heidelberg (2004).

  4. Bach E., Shallit J.: Algorithmic Number Theory, vol. 1. The MIT Press, Cambridge (1996).

  5. Blake I., Seroussi G., Smart N., Cassels J.W.S.: Advances in Elliptic Curve Cryptography. London Mathematical Society Lecture Note Series. Cambridge University Press, New York (2005).

  6. Galbraith S., Hess F., Vercauteren F.: Aspects of pairing inversion. IEEE Trans. Inf. Theory 54(12), 5719–5728 (2008).

  7. Galbraith S., Verheul R.: An analysis of the vector decomposition problem. In: PKC 2008. Lecture Notes in Computer Science, vol. 4939, pp. 308–327. Springer, Heidelberg (2008).

  8. Hess F.: Pairing lattices. In: PAIRING 2008. Lecture Notes in Computer Science, vol. 5209, pp. 18–38. Springer, Heidelberg (2008).

  9. Hess F., Smart N., Vercauteren F.: The Eta pairing revisited. IEEE Trans. Inf. Theory 52(10), 4595–4602 (2006).

  10. Joux A.: A one round protocol for tripartite Diffie-Hellman. In: ANTS 2000. Lecture Notes in Computer Science, vol. 1838, pp. 385–393. Springer, Heidelberg (2000).

  11. Kanayama N., Okamoto E.: Approach to pairing inversions without solving Miller inversion. IEEE Trans. Inf. Theory 58(2), 1248–1253 (2012).

  12. Lee E., Lee H., Park C.: Efficient and generalized pairing computation on abelian varieties. IEEE Trans. Inf. Theory 55(4), 1793–1803 (2006).

  13. Miller V. S.: Short programs for functions on curves. unpublished manuscript (1986). http://crypto.stanford.edu/miller/miller.

  14. Miller V.S.: The Weil pairing and its efficient calculation. J. Cryptol. 17(4), 235–261 (2004).

  15. Vercauteren F.: The hidden root problem. In: PAIRING 2008. Lecture Notes in Computer Science, vol. 5209, pp. 89–99. Springer, Heidelberg (2008).

  16. Vercauteren F.: Optimal pairings. IEEE Trans. Inf. Theory 56(1), 455–461 (2010).

  17. Zhao C., Zhang F., Huang J.: A note on the Ate pairing. Int. J. Inf. Security 6(7), 379–382 (2008).

Download references

Acknowledgments

The authors would like to thank the anonymous referees for their helpful comments and suggestion to improve the presentation of this paper. This work was supported by the National Research Foundation (NRF) of Korea Grant funded by the Ministry of Education, Science, and Technology (MEST), Korean Government, under Grant 2012-0001243. S. Kim acknowledges the financial support from Basic Science Research Program through the NRF funded by the Ministry of Education, Science and Technology (2012R1A6A3A01040323).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jung Hee Cheon.

Additional information

Communicated by I. Shparlinski.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, S., Cheon, J.H. Fixed argument pairing inversion on elliptic curves. Des. Codes Cryptogr. 77, 143–152 (2015). https://doi.org/10.1007/s10623-014-9993-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-014-9993-x

Keywords

Mathematics Subject Classification

Navigation