Software implementation

0Citations
Citations of this article
79Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Since the introduction of cryptographic pairings as a constructive cryptographic primitive by Sakai, Ohgishi, and Kasahara in, and by Joux in, the efficient implementation of pairings has become an increasingly important research topic. Early works still mainly considered the Weil pairing, whose computation essentially consists of two so-called Miller loops, but soon it became clear that variants of the Tate pairing are more efficient. All those variants have in common that they consist of the computation of one Miller loop and one final exponentiation. Pairings can be computed over elliptic curves represented in any coordinate system, but homogeneous projective and affine coordinates are the most common, depending on the ratio between inversion and multiplication of a specific implementation. Due to the low Hamming weight of the curve parameter and its effect on reducing the number of additions, the cost of the Miller loop is usually dominated by point doubling and the corresponding line evaluations.

Cite

CITATION STYLE

APA

Aranha, D. F., Perez, L. J. D., Mrabet, A., & Schwabe, P. (2017). Software implementation. In Guide to Pairing-Based Cryptography (p. 11). CRC Press. https://doi.org/10.1201/b12149-12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free