Elliptic curves and braid groups in cryptography암호론에서의 타원곡선과 땋임군

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 646
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorHahn, Sang-Geun-
dc.contributor.advisor한상근-
dc.contributor.authorPark, Je-Hong-
dc.contributor.author박제홍-
dc.date.accessioned2011-12-14T04:39:45Z-
dc.date.available2011-12-14T04:39:45Z-
dc.date.issued2004-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=237502&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/41869-
dc.description학위논문(박사) - 한국과학기술원 : 수학전공, 2004.2, [ vii, 93 p. ]-
dc.description.abstractIn this thesis, we study recent results of two kinds of cryptographic objects: elliptic curve and braid group cryptosystem and our contributions on it. For elliptic curve cryptosystem, we focus on two topics: elliptic curve point counting and pairing based cryptosystems. After Satoh proposed a p-adic method for counting points on elliptic curves over finite fields, several useful techniques have evolved to improve the computational efficiency of the basic Satoh algorithm. The evolution of these techniques has proved remarkably successful and reduced the computational efficiency by asymptotically optimal. We briefly review p-adic methods and present an improved algorithm. It is mainly based on the Satoh-Skjernaa-Taguchi (SST) algorithm and the modified SST algorithm, and uses a Gaussian normal basis (GNB) of small type. We show that a Gaussian normal basis can be lifted form $\mathbb{F}_q$ to $\mathbb{Z}_q$ in a natural way. From the specific properties of GNBs, efficient multiplication and the Frobenius substitution are available. Thus a fast norm computation algorithm is derived. As a result, we reduced the time complexity of both algorithms from $O(N^{2μ+0.5})$ to $O(N^{2μ +{1\choosμ +1}})$ and the space complexity still fits in $O(N^2)$ for either a small characteristic. So, applying our contribution to other recent improvements allows to compute the number of points of an elliptic curve defined over large finite fields. Pairing based cryptosystems are currently one of the most active areas of research in elliptic curve cryptography. Especially, the identity based encryption scheme of Boneh and Franklin has spurred a tremendous amount of new cryptographic research. We describe a number of simple yet amazing applications of pairings and propose a certificate-based signature scheme that can share parameters and certificate revocation strategy with the encryption scheme proposed by Gentry. We first suggest a formal security model of a certificate-based sign...eng
dc.languageeng-
dc.publisher한국과학기술원-
dc.subject겹선형함수 기반 암호시스템-
dc.subject타원곡선 위수계산-
dc.subject땋임군 기반 암호시스템-
dc.subject타원곡선 암호시스템-
dc.subjectCRYPTOSYSTEM BASED ON BILINEAR MAPS-
dc.subjectELLIPTIC CURVE POINT COUNTING-
dc.subjectBRAID BASED CRYPTOSYSTEM-
dc.subjectELLIPTIC CURVE CRYPTOSYSTEM-
dc.titleElliptic curves and braid groups in cryptography-
dc.title.alternative암호론에서의 타원곡선과 땋임군-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN237502/325007 -
dc.description.department한국과학기술원 : 수학전공, -
dc.identifier.uid020005134-
dc.contributor.localauthorHahn, Sang-Geun-
dc.contributor.localauthor한상근-
Appears in Collection
MA-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0