Eficient implementation of cryptosystems based on non-maximal imaginary quadratic orders

1Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In [14] there is proposed an ElGamal-type cryptosystem based on non-maximal imaginary quadratic orders with trapdoor decryption. The trapdoor information is the factorization of the non-fundamental discriminant Δp = Δ1p2. The NICE-cryptosystem (New Ideal Coset En-cryption) [24,12] is an eficient variant thereof, which uses an element gk ϵ Ker(ϕ −1Cl) ⊆ Cl(Δp), where k is random and ϕ −1Cl: Cl(Δpp) → Cl(Δ1) is a map between the class groups of the non-maximal and maximal order, to mask the message in the ElGamal cryptosystem. This mask simply "disappears" during decryption, which essentially consists of computing ϕ −1Cl. Thus NICE features quadratic decryption time and hence is very well suited for applications in which a central server has to decrypt a large number of ciphertexts in a short time. In this work we will introduce an eficient batch decryption method for NICE, which allows to speed up the decryption by about 30% for a batch size of 100 messages. In [17] there is proposed a NICE-Schnorr-type signature scheme. In this scheme one uses the group Ker(ϕ-1Cl) instead of IF*p. Thus instead of modular arithmetic one would need to apply standard ideal arithmetic (multiply and reduce) using algorithms from [5] for example. Because every group operation needs the application of the Extended Euclidean Algorithm the implementation would be very ineficient. Especially the signing process, which would typically be performed on a smartcard with limited computational power would be too slow to allow practical application. In this work we will introduce an entirely new arithmetic for elements in Ker(ϕ −1Cl), which uses the generator and ring-equivalence for exponentiation. Thus the signer essentially performs the exponentiation in (OΔ1=pOΔ1) *, which turns out to be about twenty times as fast as conventional ideal arithmetic. Furthermore in [17] it is shown, how one can further speed up this exponentiation by application of the Chinese Remainder Theorem for (OΔ1=pOΔ1) *. With this arithmetic the signature generation is about forty times as fast as with conventional ideal arithmetic and more than twice as fast as in the original Schnorr scheme [26].

Cite

CITATION STYLE

APA

Hühnlein, D. (2000). Eficient implementation of cryptosystems based on non-maximal imaginary quadratic orders. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1758, pp. 147–162). Springer Verlag. https://doi.org/10.1007/3-540-46513-8_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free