TY - GEN
T1 - On modular decomposition of integers
AU - Brumley, Billy Bob
AU - Nyberg, Kaisa
PY - 2009/11/9
Y1 - 2009/11/9
N2 - At Crypto 2001, Gallant et al. showed how to exploit fast endomorphisms on some specific classes of elliptic curves to obtain fast scalar multiplication. The GLV method works by decomposing scalars into two small portions using multiplications, divisions, and rounding operations in the rationals. We present a new simple method based on the extended Euclidean algorithm that uses notably different operations than that of traditional decomposition. We obtain strict bounds on each component. Additionally, we examine the use of random decompositions, useful for key generation or cryptosystems requiring ephemeral keys. Specifically, we provide a complete description of the probability distribution of random decompositions and give bounds for each component in such a way that ensures a concrete level of entropy. This is the first analysis on distribution of random decompositions in GLV allowing the derivation of the entropy and thus an answer to the question first posed by Gallant in 1999.
AB - At Crypto 2001, Gallant et al. showed how to exploit fast endomorphisms on some specific classes of elliptic curves to obtain fast scalar multiplication. The GLV method works by decomposing scalars into two small portions using multiplications, divisions, and rounding operations in the rationals. We present a new simple method based on the extended Euclidean algorithm that uses notably different operations than that of traditional decomposition. We obtain strict bounds on each component. Additionally, we examine the use of random decompositions, useful for key generation or cryptosystems requiring ephemeral keys. Specifically, we provide a complete description of the probability distribution of random decompositions and give bounds for each component in such a way that ensures a concrete level of entropy. This is the first analysis on distribution of random decompositions in GLV allowing the derivation of the entropy and thus an answer to the question first posed by Gallant in 1999.
KW - Elliptic curve cryptography
KW - GLV method
KW - Integer decompositions
UR - http://www.scopus.com/inward/record.url?scp=70350645165&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-02384-2_24
DO - 10.1007/978-3-642-02384-2_24
M3 - Conference contribution
AN - SCOPUS:70350645165
SN - 3642023835
SN - 9783642023835
T3 - Lecture Notes in Computer Science
SP - 386
EP - 402
BT - Progress in Cryptology - AFRICACRYPT 2009 - Second International Conference on Cryptology in Africa, Proceedings
T2 - 2nd International Conference on Cryptology in Africa, AFRICACRYPT 2009
Y2 - 21 June 2009 through 25 June 2009
ER -