TY - GEN
T1 - Encoding points on hyperelliptic curves over finite fields in deterministic polynomial time
AU - Kammerer, Jean Gabriel
AU - Lercier, Reynald
AU - Renault, Guénaël
PY - 2010/1/1
Y1 - 2010/1/1
N2 - We provide new hash functions into (hyper)elliptic curves over finite fields. These functions aim at instantiating in a secure manner cryptographic protocols where we need to map strings into points on algebraic curves, typically user identities into public keys in pairing-based IBE schemes. Contrasting with recent Icart's encoding, we start from "easy to solve by radicals" polynomials in order to obtain models of curves which in turn can be deterministically "algebraically parameterized". As a result of this strategy, we obtain a low degree encoding map for Hessian elliptic curves, and for the first time, hashing functions for genus 2 curves. More generally, we present for any genus (more narrowed) families of hyperelliptic curves with this property. The image of these encodings is large enough to be "weak" encodings in the sense of Brier et al. As such they can be easily turned into admissible cryptographic hash functions.
AB - We provide new hash functions into (hyper)elliptic curves over finite fields. These functions aim at instantiating in a secure manner cryptographic protocols where we need to map strings into points on algebraic curves, typically user identities into public keys in pairing-based IBE schemes. Contrasting with recent Icart's encoding, we start from "easy to solve by radicals" polynomials in order to obtain models of curves which in turn can be deterministically "algebraically parameterized". As a result of this strategy, we obtain a low degree encoding map for Hessian elliptic curves, and for the first time, hashing functions for genus 2 curves. More generally, we present for any genus (more narrowed) families of hyperelliptic curves with this property. The image of these encodings is large enough to be "weak" encodings in the sense of Brier et al. As such they can be easily turned into admissible cryptographic hash functions.
KW - Galois theory
KW - deterministic encoding
KW - elliptic curves
KW - hyperelliptic curves
UR - https://www.scopus.com/pages/publications/78650286189
U2 - 10.1007/978-3-642-17455-1_18
DO - 10.1007/978-3-642-17455-1_18
M3 - Conference contribution
AN - SCOPUS:78650286189
SN - 364217454X
SN - 9783642174544
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 278
EP - 297
BT - Pairing-Based Cryptography, Pairing 2010 - 4th International Conference, Proceedings
PB - Springer Verlag
ER -