Models of curves from GHS attack in odd characteristic

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The idea behind the GHS attack is to transform the discrete logarithm problem(DLP) in the Jacobian of a (hyper-)elliptic curve over an extension field into DLPs in Jacobians of covering curves over the base field. Diem gives a condition under which explicit defining equations for some coverings are computed. In this paper, we show that his method works without that condition. We also give explicit map from the covering to the original curve if the covering is hyperelliptic. Our method is based on a formula for the embedding of rational subfield of the function field of (hyper)elliptic curve in that of the hyperelliptic covering.

Cite

CITATION STYLE

APA

Tian, S., Yu, W., Li, B., & Wang, K. (2015). Models of curves from GHS attack in odd characteristic. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9065, pp. 171–180). Springer Verlag. https://doi.org/10.1007/978-3-319-17533-1_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free