10.07.2015 Views

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

156 Chapter 5. Complex multiplication and elliptic curvescontains the l-th roots of unity, i.e. the smallest integer such that l|p ord l(p) − 1, or equivalentlythe multiplicative or<strong>de</strong>r of p in (Z/lZ) ∗ . Then k = ord l (p)/ gcd(ord l (p), n) if q = p n . T<strong>here</strong>fore,it is ord l (p) rather than k which should be consi<strong>de</strong>red for the difficulty of the discrete logarithm.For cryptographic applications however, the base field is often chosen to be prime so that boththese values are equal.Finally, it should be noted that supersingular curves can not be used for classical public keycryptography.Proposition 5.4.2 ([192]). Let E be a supersingular curve. Then its embedding <strong>de</strong>gree k verifiesk ≤ 6.This is not a concern for ordinary curves. In<strong>de</strong>ed, for a random curve the embedding <strong>de</strong>greeis relatively large, typically of the size of l.Proposition 5.4.3 ([10]). Let (p, E) be a random couple ma<strong>de</strong> of a prime number p ∈ [M/2, M]and of an elliptic curve <strong>de</strong>fined over F p with a prime number of points l. Then the probabilitythat l|p k − 1 for k ≤ (log p) 2 is smaller thanc(log M) 9 (log log M) 2 /Mw<strong>here</strong> c is an effectively computable positive constant.5.4.3 I<strong>de</strong>ntity-based cryptographyThe i<strong>de</strong>a of i<strong>de</strong>ntity-based cryptography, proposed by Shamir [235], is to use any binary string(e.g. an email address) as a public key.A trusted third party, the Public Key Generator, publishes a master public key from whichall public keys are <strong>de</strong>rived using only public data, and keeps a master secret key to computethe secret keys corresponding to the public data. This scheme allows to encrypt messages, orcheck digital signatures, without prior distribution of public keys as in the classical public keycryptography mo<strong>de</strong>l. However, the users must highly trust the Public Key Generator, because itcan compute any private key, which is not the case in the classical infrastructure. Nonetheless,different variants exist w<strong>here</strong> this pitfall is avoi<strong>de</strong>d.The first instantiation of such an encrypting scheme appeared only many years later: in 2001in the works of Cocks [52], using quadratic residues, and of Boneh and Franklin [20, 21], usingthe Weil pairing.Elliptic curves used in such schemes should not only be resistant to attacks against the discretelogarithm, but also have a small enough embedding <strong>de</strong>gree so that the pairing is efficientlycomputable. Hence, supersingular curves are natural candidates, but their embedding <strong>de</strong>greesbeing always really small may not be sufficient and discards them for several applications. Testingrandom curves will <strong>de</strong>finitely not yield suitable curves. Using the CM method it is howeverpossible to find ordinary curves which not only have a prime, or nearly prime, number of points,but also have a controlled embedding <strong>de</strong>gree. More precisely, for a given discriminant ∆, wewant to find a couple (t, q) w<strong>here</strong> q is a prime power, t 2 − 4q = ∆ and q + 1 − t has large primedivisor l which divi<strong>de</strong>s q k − 1 for a suitable k, but not q i − 1 for i < l. This last condition can berephrased as l dividing Φ k (q) w<strong>here</strong> Φ k is the k-th cyclotomic polynomial. To summarize theabove discussion, the following conditions are nee<strong>de</strong>d:1. t 2 − 4q = ∆ w<strong>here</strong> q is a prime power;2. l | q + 1 − t w<strong>here</strong> l is a large prime;

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!