期刊文献+

求解迹1椭圆曲线上的离散对数 被引量:1

Solving the discrete logarithm on elliptic curve of trace one
下载PDF
导出
摘要 自Nigel Smart首次提出迹1的椭圆曲线是不安全的,针对迹1椭圆曲线的理论研究逐渐多了起来,这些研究成果对于椭圆曲线的应用起到了积极作用,然而对迹1椭圆曲线的实践研究却很少有学者关注。为了较好地理解迹1椭圆曲线的理论成果,了解算法的实施过程和效果,给出了求解离散对数的方法.利用Hensel提升理论,在Q_(p)域上通过约减和形式对数的方法求解离散对数,同时分析了该方法的计算效率,最后通过实例验证了该方法的正确性和有效性。 Since Nigel Smart firstly put forword that elliptic curve of trace one is unsafe,more researches on the theory of trace one have been conducted and these research results has played a positive role.However few scholars have focused on practical research on elliptic curve of trace one.In order to better understand elliptic curve theory achievement,to understand the algorithm attack process and effect,this paper put forward the concrete method to solve discrete logarithm.The method of solving the discrete logarithm is given,using the theory of Hensel lifting,in the Q_(p)domain by subtract and formal logarithmic method.At the same time,the computational efficiency of the method is analyzed.Finally,an example is given to verify the correctness and effectiveness of the method.
作者 胡建军 王伟 李恒杰 HU Jianjun;WANG Wei;LI Hengjie(School of Digital Media,Lanzhou University of Arts and Science,Lanzhou 730010,China)
出处 《安徽大学学报(自然科学版)》 CAS 北大核心 2023年第6期1-6,共6页 Journal of Anhui University(Natural Science Edition)
基金 兰州文理学院服务地方经济社会发展计划基金资助项目(2021FWDF15)。
关键词 椭圆曲线 离散对数 素域 反常曲线 trace elliptic curve discrete logarithm prime domain anomalous
  • 相关文献

参考文献3

二级参考文献25

  • 1刘新汉,谢晓尧.一种基于素域的安全椭圆曲线选取算法[J].机械与电子,2010,28(S1):134-136. 被引量:1
  • 2王庆先,孙世新.广义最优扩域上的快速运算[J].电子与信息学报,2006,28(3):404-406. 被引量:2
  • 3Pierrick Gaudrya, cric Schost. Genus 2 point counting over prime fields [J]. Journal of Symbolic Computa- tion,2012,47(4) :368-400.
  • 4Streng M. Complex multiplication of abelian surfaces [D]. Universiteit Leiden,2010.
  • 5Silverberg A. Group Order Formulas for Reductions of CM Elliptic Curves. Contemporary Mathematics [C]// 2010 Mathematics Subject Classification, 11G15, 11G05,11G20 : 1-14.
  • 6Hankerson D, Menezes A, Vanstone S. Guide tO El- liptic Curve Cryptography [M] Springer-Verlag, 2004:82-83.
  • 7Koblitz N. Elliptic curve cryptosystems[J] . Mathematics of Computation, 1987, 48(177):203-209.
  • 8Sutherland A V. Constructing elliptic curves over finite fields with prescribed torsion[J] . Mathematics of Computation, 2012, 81(278):1131-1147.
  • 9Han Xuli, Zhu Yuanpeng. Curve construction based on five trigonometric blending functions[J] . BIT Numerical Mathematics, 2012, 52(4):953-979.
  • 10Grechnikov E A. Method for constructing elliptic curves using complex multiplication and its optimizations[J] . Prikladnaya Diskretnaya Matematika, 2011(3):17-54.

共引文献6

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部