Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to content
BY-NC-ND 3.0 license Open Access Published by De Gruyter February 20, 2018

Generating pairing-friendly elliptic curve parameters using sparse families

  • Georgios Fotiadis EMAIL logo and Elisavet Konstantinou

Abstract

The majority of methods for constructing pairing-friendly elliptic curves are based on representing the curve parameters as polynomial families. There are three such types, namely complete, complete with variable discriminant and sparse families. In this paper, we present a method for constructing sparse families and produce examples of this type that have not previously appeared in the literature, for various embedding degrees. We provide numerical examples obtained by these sparse families, considering for the first time the effect of the recent progress on the tower number field sieve (TNFS) method for solving the discrete logarithm problem (DLP) in finite field extensions of composite degree.

MSC 2010: 14H52; 11G20; 94A60

1 Introduction

For a prime q, let E/𝔽q be an ordinary elliptic curve with Frobenius trace t=q+1-#E(𝔽q), where E(𝔽q) is the group of 𝔽q-rational points, for which #E(𝔽q)q. Let E[r] be the r-torsion group of E/𝔽q, for some r>0, containing all points of E(𝔽¯q) with order r. Define also the CM discriminantD>0 of the curve E/𝔽q as the square-free integer satisfying the CM equationDy2=4q-t2, for some y.

An asymmetric pairing on an ordinary elliptic curve E/𝔽q is a bilinear, non-degenerate, efficiently computable map of the form e^:𝔾1×𝔾2𝔾T, where 𝔾1,𝔾2E(𝔽q) and 𝔾T𝔽qk* such that #𝔾1=#𝔾2=#𝔾T=r, for some prime r. The positive integer k is called the embedding degree of the curve E/𝔽q and it is the smallest integer, such that E[r]E(𝔽qk). In pairing-based applications, the elliptic curves are chosen such that the following conditions are satisfied:

  1. The order of the curve is #E(𝔽q)=hr, for a small cofactorh1 and a large prime r.

  2. The ρ-value of the curve, defined as ρ=logqlogr is close to 1, hence logqlogr.

  3. The prime r must be large enough, so that the DLP in 𝔾1 and 𝔾2 is computationally hard.

  4. The embedding degree k is large enough, so that the DLP in the extension field 𝔽qk, and hence in 𝔾T, is approximately as hard as in 𝔾1,𝔾2.

  5. The embedding degree k is small enough, for efficient operations in 𝔾T.

  6. The sizes of r and qk provide at least an 128-bit security level, corresponding to an AES symmetric key, in the source groups 𝔾1,𝔾2 and the target group 𝔾T.

An elliptic curve E/𝔽q with embedding degree k satisfying these properties is called pairing-friendly.

Our purpose is to determine pairing-friendly elliptic curve parameters (q,t,r) satisfying the above conditions. There are two basic strategies for finding such triples, namely the Cocks–Pinch method [10] and the Dupont–Enge–Morain (DEM) method [5]. In both cases the trace of Frobenius t is set as the lift of some integer in (/r)*. Therefore, t has approximately the same size as r, which in turn implies that the generic ρ-value is ρ2 in both methods. Such choices of parameters do not lead to efficient pairing computations, when considering the most well-known variants of the Tate pairing, namely the Ate and twisted-Ate asymmetric pairings. This problem can be avoided by representing the elliptic curve parameters (q,t,r) as polynomial families(q(x),t(x),r(x)) in [x]. There are three types of polynomial families depending on the form of the CM polynomialf(x)=4q(x)-t(x)2, which is the right-hand side of the CM equation expressed in polynomial terms.

Definition 1 ([3]).

A polynomial family (q(x),t(x),r(x)) is complete if there exists a y(x)[x] such that f(x)=Dy(x)2, for some square-free D>0. If f(x)=g(x)y(x)2, for some g(x)[x] with degg=1, the family is complete with variable discriminant, and if g(x) is quadratic, not a perfect square, with positive leading coefficient (i.e. lc(g)>0), the family is sparse.

When using polynomial families (q(x),t(x),r(x)), we can generate pairing-friendly triples by evaluating these polynomials at some x0 such that q(x0) and r(x0) are both primes and 4q(x0)-t(x0)2=Dy2, for some square-free D>0 and some y. With this notation, t(x0) is the Frobenius trace, q(x0) is the base field prime and r(x0) is the prime dividing the order of the curve. The most well-known method for constructing polynomial families is the Brezing–Weng method [2]. This is an extension of the Cocks–Pinch method, but now operations are performed in the polynomial field [x]/r(x). In this case the size of the Frobenius trace t(x0) is smaller than the size of r(x0). More precisely, we obtain logt(x0)=dlogr(x0), where d=1degr in the best case and d=1-1degr in the worst case. This has several advantages compared to the Cocks–Pinch and DEM methods, implying that we can exploit the efficient Ate and twisted-Ate pairing computations when defined on Brezing–Weng elliptic curves.

Freeman, Scott and Teske [10] suggested that for pairing applications, the sizes of curve parameters should be selected according to Table 1. The complexity of the DLP in the r-order subgroups 𝔾1,𝔾2E(𝔽q) is O(r) (Pollard’s rho method). For the DLP in finite field extensions 𝔽qk there has been recently a progress on the tower number field sieve (TNFS) method [13, 16] that affects its complexity when k is composite. These new improvements imply that when k is prime, we can follow the recommendations of Table 1 for selecting curve parameters, but when k is composite, Table 1 should be updated.

Table 1

Bit size of elliptic curve parameters and embedding degrees for various security levels.

Embedding degree
Security levelSubgroup sizeExtension field sizeρ1ρ2
1282563,000–5,00012–206–10
1923848,000–10,00020–2610–13
25651214,000–18,00028–3614–18

Complete families are studied in [1, 2, 12, 23, 24] and they are attractive for applications due to their small CM discriminant. However, in [6] it is recommended to use curves with large discriminant to avoid various attacks on the DLP. This is achieved by the other two types. Complete families with variable discriminant are studied in [3, 10, 14]. Sparse families for k=3,4,6 are constructed in [4, 7, 11, 17, 21], but offer a low security level of 80-bits. Consequently, we need to search for sparse families with k{3,4,6} and so far there are only few such examples in the literature. The first is due to Freeman for k=10 and ρ=1. There are also two examples for k=8,12 and ρ1.5 presented in [3], while in [8] we introduced sparse families for k=5,10 with ρ1.5.

In this paper we focus on the construction of sparse families for various embedding degrees. Particularly our contribution is threefold.

  1. We propose a method for producing sparse families with for any k that combines previous work presented in [3, 14]. Firstly, we apply Lee–Park’s method [14] in order to determine polynomials r(x), t(x) and then Dryło’s method [3] for constructing CM polynomials of Definition 1.

  2. We introduce more sparse families for k{5,8,10,12} and the first examples in the literature for a variety of other k as well, with ρ2.

  3. We produced numerical examples of cryptographic value, considering the recent progress on the TNFS method for reducing the complexity of the DLP in finite field extensions of composite degree [13, 16].

The rest of the paper is organized as follows. In Section 2 we present the necessary background related to pairing-friendly elliptic curves and overview the most important work on the three types of polynomial families. We analyze our method in Section 3 and demonstrate our experimental results in Section 4. We conclude the paper in Section 5.

2 Background and previous work

Recall that our goal is to determine suitable integer triples (q,t,r), for some fixed and relatively small embedding degree k. So far, the best ρ-values are achieved when representing q,t,r as polynomial families (q(x),t(x),r(x)) in [x], respectively.

Definition 2 ([10]).

Let q(x),t(x),r(x)[x] be non-zero polynomials. We say that a polynomial triple (q(x),t(x),r(x))parameterizes a family of pairing-friendly ordinary elliptic curves with embedding degree k and CM discriminant D, if the following are satisfied:

  1. q(x) represents primes, i.e. it is non-constant, irreducible, with positive leading coefficient. Additionally, q(x), for some (or infinitely many) x and gcd({q(x):x,q(x)})=1,

  2. r(x) is non-constant, irreducible, integer-valued, with positive leading coefficient,

  3. r(x) divides both q(x)+1-t(x) and Φk(t(x)-1), where Φk(x) is the kth cyclotomic polynomial,

  4. there are infinitely many integer solutions (x,Y) for the parameterized CM equation

    (2.1)DY2=4q(x)-t(x)2.

The ρ-value of a polynomial family (q(x),t(x),r(x)) is defined as

ρ(q,t,r)=degqdegr.

The condition r(x)(q(x)+1-t(x)) implies that #E(𝔽q(x))=q(x)+1-t(x)=h(x)r(x) for a cofactor h(x)[x]. Substituting into equation (2.1), we obtain

DY2=4h(x)r(x)-(t(x)-2)2.

The condition r(x)Φk(t(x)-1) means that t(x)-1 is a primitive kth-root of unity in [x]/r(x). Finding polynomials t(x),r(x) satisfying this condition is not straightforward. Usually r(x) is taken as the kth cyclotomic polynomial for some k>0. More results can be obtained if we allow r(x) to be an irreducible polynomial dividing Φk(t(x)-1), for some t(x)[x] (see for example [14, 23]). Once r(x) is fixed, we must obtain a solution (x0,Y0) for equation (2.1) such that q(x0) and r(x0) are large primes. Then we apply the CM method to construct an elliptic curve E/𝔽q(x0), with Frobenius trace t(x0) and order #E(𝔽q(x0))=h(x0)r(x0), requesting h(x0) to be small.

Let f(x)=4q(x)-t(x)2[x] be the CM polynomial of the form f(x)=g(x)y(x)2, with y(x),g(x)[x] and degg2. By Definition 1, if degg=0, the family (q(x),t(x),r(x)) is complete and thus f(x)=Dy(x)2, for some square-free D>0. If degg=1, the family is complete with variable discriminant and, finally, if degg=2, with g(x) not a perfect square and lc(g)>0, the family is sparse.

Complete families.

The most common method for constructing complete families is due to Brezing and Weng [2]. This method starts by fixing an embedding degree k and a square-free CM discriminant D. Then, it chooses an irreducible polynomial r(x)[x] such that ζk,-D[x]/r(x), where ζk is a primitive kth-root of unity. Finally, it sets t(x) and y(x) as the polynomials mapping to ζk+1 and (ζk-1)/-D, respectively, and q(x)=14(t(x)2+Dy(x)2). For more examples of this type of families, see [10, 12, 23, 24].

The small discriminants make complete families very attractive for implementations. However, according to [6] we need larger CM discriminants to avoid various attacks on the DLP. This is done by the other two types of polynomial families, for which the CM discriminant has a polynomial representation. Note however that although larger CM discriminants might be preferable, these values should not be too large, since a large D would affect the efficiency of the CM method. More precisely, the CM discriminant D should be at most 1013, which is the current record for constructing Hilbert class polynomials using the Chinese Remainder Theorem (see [22]).

Complete families with variable discriminant.

By Definition 1 the CM polynomial is f(x)=g(x)y(x)2 and degg=1. These families can be constructed via the Brezing–Weng method by replacing the square-free integer D with a linear term g(x) such that -g(x)[x]/r(x). Such examples appear in [3, 10, 14, 15]. Although this type offers more flexible CM-discriminant, the choices are still limited, especially as the value k increases. In particular, in order to find suitable parameters with this type of families, we are searching for x0=Dy2 such that r(x0) and q(x0) are both primes of reasonable size and so as degr grows, the choices for D are limited.

Sparse families.

The CM polynomial is f(x)=g(x)y(x)2, where g(x) is quadratic, non-square, with lc(g)>0. With sparse families, curve parameters derive from the solutions of a generalized Pell equation. The first examples were the MNT families (see [17] and [4, 7, 11, 21]) for k{3,4,6} and ρ(q,t,r)=1. These are ideal families in terms of the ρ-value, but correspond to a low security level of 80-bits. In [9], Freeman introduced a sparse family for k=10 with ρ(q,t,r)=1 and Dryło [3] proposed a method for producing sparse families offering two new examples for k=8,12 with ρ(q,t,r)=1.5. We note that Freeman’s family is the only known ideal sparse family in terms of ρ, for k3,4,6. Finally, in [8] we described two alternatives for producing sparse families. In the first we are searching for polynomials r(x),t(x) such that f(x)-(t(x)-2)2modr(x)=g(x)y(x)2, while in the second we are searching for a cofactor h(x) such that f(x)=4h(x)r(x)-(t(x)-2)2=g(x)y(x)2. We generated new examples for k=5,10 and ρ(q,t,r)=1.5.

Contribution.

We argue that sparse families offer more flexibility on the CM discriminant, but for k{3,4,6} are very rare. Additionally, numerical examples of suitable parameters (q,t,r) obtained from sparse families can be found in the literature only for Freeman’s family [9] and in our earlier work [8], for k=5,10. Motivated by these facts, we further study the construction of this type of families. In particular, our contribution is summarized as follows: The proposed method. We propose a method that combines Lee–Park’s [14] and Dryło’s [3] ideas. More precisely, we first apply Lee and Park’s method for constructing polynomials t(x),r(x) such that r(x)Φk(t(x)-1). Then we follow Dryło’s process in order to fix a CM polynomial f(x)=g(x)y(x)2, for some non-square g(x)[x], with degg=2 and lc(g)>0. In particular, we are searching for an element z(x)[x]/r(x) such that -z(x)2g(x)modr(x). This condition allowed us to produce more sparse families than any other work focusing on this type of families. New families. Using this method, we produced new sparse families for various embedding degrees k3,4,6 that have not previously appeared in the literature, with ρ(q,t,r)<2. Additionally, Table 1 indicates that families with ρ(q,t,r)2 are also likely to offer a balanced security level in the three groups 𝔾1,𝔾2 and 𝔾T of a pairing. This motivates us to introduce the first sparse families in the literature with ρ(q,t,r)=2.

Experimental results. We implemented the proposed method together with a Pell equation solver and produced several pairing-friendly parameters. Our results are aiming for security levels of at least 128-bit AES key, which is today’s state of the art. The values q and r are chosen with respect to Table 1 for prime k. On the other hand, for composite k the extension field size klogq is taken larger than the recommended values of Table 1 (see [6]), in order to surpass the threat of the new variants of the TNFS method [13, 16]. Finally, in our examples we have considered CM discriminants up to 2106. More examples can be obtained by allowing even larger D.

3 Sparse families of pairing-friendly elliptic curves

To construct sparse families of pairing-friendly elliptic curves, the first step is to find an irreducible polynomial r(x)[x] and a trace polynomial t(x)[x] such that r(x)Φk(t(x)-1), for some fixed k. In order to implement this we adopt Lee and Park’s method [14]. Once these polynomials are constructed, the next step is to determine a non-square polynomial g(x), with degg=2 and lc(g)>0, such that the CM polynomial is f(x)=g(x)y(x)2, with y(x)[x]. For this step we use Dryło’s method [3]. The construction of the remaining polynomials y(x),q(x) is straightforward.

Finding the polynomial r(x).

Following Lee and Park [14], we start by choosing an arbitrary embedding degree k{1,2,3,4,6} and fixing an element θ(ζk) of the form

(3.1)θ=a0+a1ζk+a2ζk2++aφ(k)-1ζkφ(k)-1

such that u(θ)=ζk in (ζk), for some u(x)[x] and ai, for every i=0,,φ(k)-1. Let (θ) and (ζk) be the following sets:

(θ)={1,θ,,θφ(k)-1}and(ζk)={1,ζk,,ζkφ(k)-1}.

The polynomial u(x) can be found by constructing the transition matrixP from the set (θ) to (ζk), which is a φ(k)×φ(k) matrix with elements Pij obtained by the relation

θj=i=0φ(k)-1Pijζkifor each j=0,1,,φ(k)-1.

If det(P)0, the transition matrix P has an inverse P-1=(Pij) and we set u(x) as

(3.2)u(x)=i=0φ(k)-1Pi1xi.

By [14, Lemma 2], Φk(u(x)) has an irreducible factor of degree φ(k), which is set as r(x). Additionally, with this setup we get that u(x) is a primitive kth-root of unity in K=[x]/r(x). Note also that the coefficients of u(x) are multivariate polynomials in [a0,a1,,aφ(k)-1] and so we need to ensure that a0,a1,,aφ(k)-1 are chosen such that det(P)0.

The complexity of this procedure depends on the value φ(k)=degr and as this value grows, the efficiency of the process is affected. In our examples we used this method for cases where φ(k)=4, corresponding to embedding degrees 5, 8, 10 and 12, but the method can be applied also for higher embedding degrees. We can avoid this procedure by setting r(x) as the kth-cyclotomic polynomial, where in this case u(x)=x represents a primitive kth-root of unity in K=[x]/r(x).

Searching for g(x).

After constructing u(x) and r(x), the next step is to find a quadratic, non-square polynomial g(x) with lc(g)>0 such that -g(x)K=[x]/r(x). In other words, we need to find an element z(x)K such that -z(x)2=g(x) in K. We write

(3.3)z(x)=zφ(k)-1xφ(k)-1++z2x2+z1x+z0

and we are searching for z0,z1,,zφ(k)-1 such that -z(x)2modr(x) is quadratic, non-square, with positive leading coefficient. However, we do not need to search all the φ(k) variables zi. In particular, we set

(3.4)-z(x)2[i=0φ(k)-1gi(z0,z1,,zφ(k)-1)xi]modr(x),

where all gi(z0,z1,,zφ(k)-1) are multivariate polynomials with rational coefficients that represent the coefficients of g(x). Since we wish -z(x)2 to be a quadratic, we set

gi(z0,z1,,zφ(k)-1)=0

for all i=3,4,,φ(k)-1. Solving this system will eliminate some of the zi and hence improve the efficiency of the search. Finally, we need g2(z0,z1,,zφ(k)-1)>0 and the discriminant of g(x) to be non-zero, so that g(x) is not a perfect square. This process is also described in [3].

Computing the remaining polynomials.

So far we have determined the polynomial r(x), a polynomial u(x) representing a primitive kth-root of unity in K=[x]/r(x), the non-square, quadratic polynomial g(x), with lc(g)>0 and a polynomial z(x)=-g(x) in K. Following the original Brezing–Weng method [2], we can compute the remaining polynomials in the following way. For each primitive kth-root of unity ζk[u(x)jmodr(x)], with j=1,2,,φ(k)-1, such that gcd(j,k)=1 we set t(x)[u(x)j+1]modr(x) and

y(x)[(u(x)j-1)z(x)-1]modr(x)=[i=0φ(k)-1yi(z0,z1,,zφ(k)-1)xi],

where z(x)-1 is the multiplicative inverse of z(x) in [x]/r(x). We then set the CM and field polynomials as f(x)=g(x)y(x)2 and q(x)=14[t(x)2+f(x)], respectively. Note that the field polynomial must represent primes in the sense of Definition 2. If this is true, we have a sparse family (q(x),t(x),r(x)) of pairing-friendly elliptic curves with embedding degree k.

Additional conditions.

With our construction, we have

degt,degyφ(k)-1

and

degf=degg+2degy=2+2degy2φ(k).

Thus the ρ-value of these polynomial families is

ρ(q,t,r)=degqdegr=deg[t(x)2+f(x)]degr=max{2degt,2+2degy}degr2.

For ρ-values less than 2, we need the degree of y(x) to be less than φ(k)-1 and so we set

yφ(k)-1(z0,z1,,zφ(k)-1)=0.

This is an extra equation in (z0,z1,,zφ(k)-1) and using it we can eliminate more of the zi. However, we also give examples with ρ(q,t,r)=2, in which case the above equation must be non-zero. Even more zi can be eliminated if we allow the polynomial g(x) to have the same leading coefficient and constant term. In other words this is written as

g2(z0,z1,,zφ(k)-1)=g0(z0,z1,,zφ(k)-1).

Most of the examples presented in this work respect this additional properties.

Algorithm 1 (Sparse families of pairing-friendly elliptic curves.).

Summary and the algorithm.

The conditions that need to be met for the coefficients (z0,z1,,zφ(k)-1) of the polynomial z(x)K lead to the following system of multivariate equations:

(3.5)gφ(k)-1(z0,z1,,zφ(k)-1)==g3(z0,z1,,zφ(k)-1)=0,g2(z0,z1,,zφ(k)-1)>0,Δg0,yφ(k)-1(z0,z1,,zφ(k)-1)=0(optional),g2(z0,z1,,zφ(k)-1)-g0(z0,z1,,zφ(k)-1)=0(optional),}

where Δg denotes the discriminant of the polynomial g(x). If we wish to construct sparse families with ρ(q,t,r)=2, we need to exclude the fourth condition from system (3.5). Additionally, we can find more suitable polynomials g(x) by excluding the last condition of system (3.5). The above process is described in Algorithm 1.

Remark 1.

Note that if the φ(k)-tuple (z0,z1,,zφ(k)-1) is a suitable solution of system (3.5), then the φ(k)-tuple (nz0,nz1,,nzφ(k)-1), for any n/{0}, is also a solution for this system, but it will generate the same sparse family. Furthermore, two quadratic polynomials g(x) and g(x) are said to be equivalent if there is a linear transformation x(ay+b) such that g(x)=g(ay+b). In this case, the polynomials g(x) and g(x) also generate the same sparse family.

Since we are searching for integer triples (q,t,r), we need to ensure that for each output of Algorithm 1 the polynomials q(x),t(x) and r(x) have integer coefficients. In order to do this, we need to find the smallest positive integer n such that nq(x)[x] and then search for the smallest positive factor m of n such that q(mx+l)[x], for some integer l[-m,m] (see [12, 14] for details). However, such a linear transformation does not always exist. If it does, we apply it on q(x),t(x) and r(x) and test if q(mx+l), t(mx+l) and r(mx+l) have integer coefficients.

3.1 Cyclotomic sparse families

When r(x) is the kth cyclotomic polynomial Φk(x), for some fixed k, then u(x)=x and we omit the first three steps of Algorithm 1. With this setup, every power xj for j=1,,φ(k)-1 such that gcd(j,k)=1 is a primitive kth-root of unity in [x]/r(x). We here give the first cyclotomic sparse families in the literature for embedding degrees k{5,7,8,9,10,12,14,15,18,20,30} and ρ(q,t,r)2. Note that as φ(k) grows, it is harder to determine a suitable element z(x)K. The following results are restricted for cases where φ(k)8.

3.1.1 The case k=5

We have r(x)=Φ5(x) and thus z(x)=z3x3+z2x2+z1x+z0. Setting g3(z0,z1,z2,z4)=0, we get that

z(x)=z3x3+z2x2+z1x+z22+2z3z1-2z2z12z3,

and in this case degg=2.

Table 2

Cyclotomic sparse families for k with φ(k)=4 and ρ(q,t,r)=1.5.

Familykt(x)g(x)y(x)x0
15x+13x2-2x+3-(2x2+2x+1)x0
25x3+14x2+7x+4x2+11mod2
38-x3+17x2-26x+7-117(3x2-x+3){8,15}mod17
48-x3+114x2-20x+1412(x2+2x+1)1mod2
510x3+112x2-3x+4111(x2+2x+3){7,13}mod22
610x3+13x2+10x+3111(x2+3x+1){2,6}mod11
710x3+115x2+50x+15155(7x2-x+7){2,13,17,28}mod55
810-x3+x2-x+220x2-35x+2015(x2+x)0mod10

Furthermore, adding the condition g2(z0,z1,z2,z4)=g0(z0,z1,z2,z4), we get z2=0 or z2=2z3. In the first case if we set t(x)=x+1 and y3(z0,z1,z2,z4)=0, we obtain z3=2z1. In the second case we set t(x)=x3+1 and then the polynomial y(x) is quadratic. We conclude to the following polynomials z(x):

z(x)=2z1x3+z1x+z1for t(x)=x+1,
z(x)=z3x3+2z3z2+z1x+2z3-z1for t(x)=x3+1.

In the first polynomial z(x) we set z1=1 and obtain the first family of Table 2. By Remark 1, taking any other z1 will lead us to an equivalent family. For the second case we give an example for (z1,z3)=(2,1) in Table 2. Polynomial families with k=5 and ρ(q,t,r)=1.5 correspond to a security level below 128-bits in the extension field 𝔽q5, for a 256-bit prime r. In order achieve a security level around 128-bits we consider sparse families with ρ(q,t,r)=2. Note that in this case we require degy=3 and hence y3(z0,z1,z2,z3)0. Such examples are presented in Table 5.

3.1.2 The case k=8

Quadratic polynomials g(x) can be obtained by setting the polynomial z(x) as

z(x)=z3x3+z2x2+z1x-z1z2z3.

Adding the condition g2(z0,z1,z2,z3)=g0(z0,z1,z2,z3), we get that z2=±z3 and for t(x)=±x3+1, respectively, we have y3(z0,z1,z2,z3)=0. In other words we conclude to the polynomials z(x) of the form

z(x)=z3x3±z3x2+z1xz1for t(x)=±x3+1.

Examples for (z1,z3)2(0,0) with ρ(q,t,r)=1.5 and ρ(q,t,r)=2 appear in Tables 2 and 5.

3.1.3 The case k=10

In [9], Freeman presented a sparse family for k=10 and ρ(q,t,r)=1. This is the only known ideal sparse family in terms of the ρ-value for k3,4,6. We give more examples with ρ(q,t,r)=1.5 and ρ(q,t,r)=2 in Tables 2 and 5, respectively. In particular, in order to obtain a quadratic polynomial g(x) we set

z(x)=z3x3+z2x2+z1x-z22+2z3z1+2z2z12z3.

Adding the constraint g2(z0,z1,z2,z3)=g0(z0,z1,z2,z3), we get that z2=0 or z2=-2z3. In the first case, for t(x)=x3+1, the polynomial y(x) is quadratic and so we have

z(x)=z3x3+z1x-z1for t(x)=x3+1.

In the second case we add the condition y3(z0,z1,z2,z3)=0, in which case for t(x)=-x3+x2-x+2 we get z1=43z3. Then we have

z(x)=z3x3-2z3x2+4z33x-2z33for t(x)=-x3+x2-x+2.

Sparse families with ρ(q,t,r)=1.5 are presented for both cases in Table 2 and with ρ(q,t,r)=2 in Table 5. In these tables we also give examples of sparse families with polynomials g(x) such that

g2(z0,z1,z2,z3)g0(z0,z1,z2,z3).

For k=12 we could not find any examples of cyclotomic sparse families. However, we cover this case by taking r(x) as a non-cyclotomic polynomial. For k=5,8,10 and 12 the construction of suitable polynomials z(x) is easy, since the degree of the polynomial r(x) is small, i.e. degr=φ(k)=4. When φ(k) increases, this search is much harder. However, we give a few examples for degr=6,8 in the following paragraphs.

3.1.4 The case where φ(k)=6

When φ(k)=6, the embedding degree is 7, 9, 14 or 18 and since r(x)=Φk(x), we have degr=6. In such cases z(x)[x] is a degree 5 polynomial, written as

z(x)=z5x5+z4x4+z3x3+z2x2+z1x+z0.

Then we can easily eliminate at least two of its coefficients, namely z0 and z1, by solving the equations

g5(z0,z1,z2,z3,z4,z5)=g4(z0,z1,z2,z3,z4,z5)=0

in terms of z0 and z1, respectively.

Table 3

Cyclotomic sparse families for k with φ(k)=6 and ρ(q,t,r)=1.6667.

Familykt(x)g(x)y(x)x0
17x5+1208x2+375x+208171(38x4-23x3+50x2-23x+38){37,91,103,119}mod142
29x5+18x2+35x+8-1109(x4-18x3-4x2-18x+1){27,105,147,175}mod218
39x5+151x2+126x+511543(47x4+x3+57x2+x+47){43,73,424,442}mod543
414x5+14x2+5x+4-(2x4-5x3+6x2-5x+2)1mod2
518x5+14x2+9x+4-119(3x4-2x3-8x2-2x+3){3,13,15,33}mod38
618x5+119x2+30x+19-137(3x4+5x3-7x2+5x+3){3,4,25,28}mod37

Examples of sparse families for these cases appear in Table 3 for ρ(q,t,r)=1.6667 and in Table 6 for ρ(q,t,r)=2. These are the first sparse families in the literature for k{7,9,14,18}. Note that when k=7, we can choose suitable parameters following Table 1, since this case is not affected by the exTNFS or SexTNFS methods [13, 16]. In the other three cases, the embedding degree is composite and hence we need to update the recommendations of Table 1, in order to avoid the new TNFS attacks.

Table 4

Cyclotomic sparse families for k with φ(k)=8, t(x)=x7+1 and ρ(q,t,r)=1.75.

kg(x)y(x)x0
30155x2+350x+15519755(433x6-293x5-149x4+637x3-149x2-293x+433){707,1003,1228,1348,2658
3582,5533,6042,7993,8807
9032,9152}mod9755

3.1.5 The case where φ(k)=8

This case corresponds to embedding degrees 15, 16, 20, 24, 30. We have degr=8 and z(x)[x] is written as

z(x)=z7x7+z6x6+z5x5+z4x4+z3x3+z2x2+z1x+z0.

In such cases we can eliminate the three coefficients z0,z1,z2 by solving the following system of equations:

g7(z0,z1,z2,z3,z4,z5,z6,z7)=g6(z0,z1,z2,z3,z4,z5,z6,z7)=g5(z0,z1,z2,z3,z4,z5,z6,z7)=0.

We have found only one such example for k=30, with t(x)=x7+1 and ρ(q,t,r)=1.75 in Table 4. Two families for k=15,20 with ρ(q,t,r)=2 appear in Table 7.

3.1.6 Sparse families with ρ(q,t,r)=2

As stated in [19], elliptic curve parameters with ρ2 might as well offer fast pairing computations. Additionally, examples with ρ2 can also achieve a nice balance corresponding to security levels of 128-, 256- and 512-bits. In Tables 57 we gather a few examples of cyclotomic sparse families, with ρ(q,t,r)=2, where degr=4,6 and 8, respectively. Since ρ(q,t,r)=2, we have excluded the condition

yφ(k)-1(z0,,zφ(k)-1)=0

from system (3.5). Hence the polynomials y(x) have degy=φ(k)-1 and thus

degq=2φ(k)=2degr.

Furthermore, we are restricted to cases where the coefficients of the polynomials z(x) are integers in the range [-10,10]. More examples can be found by expanding this range, however we are aiming for polynomials that have relatively small coefficients. Additional examples can be also obtained by considering rational coefficients for z(x). In our examples we generally focus on embedding degrees for which the polynomial families are likely to offer pairing-friendly parameters with a nice balance between the security levels in the three defining groups of a pairing. We note that the number of suitable sparse families decreases as the value φ(k) grows. More precisely, we found many families for cases where φ(k)=4 and just a few for φ(k)=8.

Table 5

Cyclotomic sparse families with degr=4 and ρ(q,t,r)=2.

Familykt(x)g(x)y(x)x0
15x+13x2-10x+3111(4x3+2x2+6x+3){2,5,9}mod11
25x2+13x2+2x-1-111(10x3+6x2+x+3){3,5,9}mod11
38-x3+1x2+10x+117(3x3-x2+1)9mod14
48-x+17x2-10x+72x3-2x-3x0
58-x+17x2-26x+7117(2x3-2x-5){8,11,15}mod17
68-x+114x2-20x+14-12(3x3-3x-4)1mod2
710x3+13x2-2x-1-111(8x3-7x2+3x-9){2,6,8}mod11
810x+13x2+10x+3111(2x3-2x2+3){2,4,6}mod11
910x+115x2+50x+15-155(8x3-8x2+1){2,13,17,28,37,48}mod55
Table 6

Cyclotomic sparse families with degr=6 and ρ(q,t,r)=2.

Familykt(x)g(x)y(x)x0
17x2+14x2-5x+4x5+4x4+7x3+8x2+6x+21mod2
27x4+14x2-5x+44x5+8x4+9x3+6x2+2x-11mod2
37x5+14x2-5x+44x5+6x4+5x3+2x2-x-21mod2
47-x5-x4-x3-x2-x4x2-5x+42x5+2x4+x3-x2-2x-20mod2
57x+17x2+42x+7-191(16x5-4x4-4x3+16x2+11){5,31,57}mod91
67x2+17x2+42x+7191(4x5+24x4+4x3+5x+5){15,54,67,80}mod91
77x3+17x2+42x+7191(4x5+4x4-15x2+x-15){33,59,72,85}mod91
87x4+17x2+42x+7-191(16x5+15x3+19x2+19x+15){8,47,73}mod91
99x+14x2-9x+4-119(x5+5x4-4x3+6x2+6x-2){5,21,23,25,35}mod38
109x+112x2-33x+12151(9x5-3x4+4x3+6x2+6x+2)13mod102
119x+119x2-30x+19137(8x5+4x4+10x3+12x2+12x+5){4,9,12,33,34}mod37
1214-x2+14x2+5x+43x5-4x4+3x3-2x+21mod2
1314-x5+x4-x3+x2-x+24x2+5x+42x5-6x4+9x3-9x2+6x-20mod2
1418x+14x2+9x+4-119(7x5-x4-6x2-6x+10){3,13,15,23,33}mod38
1518x+119x2+30x+19137(26x5-14x4-12x2-12x+29){3,4,6,25,28}mod37
Table 7

Cyclotomic sparse families with degr=8 and ρ(q,t,r)=2.

Familykt(x)g(x)y(x)x0
115x2+13x2-18x+3193(20x7-8x6-22x5+20x4+14x3+6x2+7x-15){9,24,45,51,69,72,90}mod93
220x+140x2-55-1505(20x7+23x6-43x5-4x4+24x3+68x2-88x+20){41,57,115,145,161,163,241,
243,317,347,363,365,443,
445,461,565,645,647,663,
751,767,847,865,923,
721,953,971}mod1010

3.2 Non-cyclotomic sparse families

Now we present examples of sparse families where r(x) is not a cyclotomic polynomial, but an irreducible polynomial in [x], satisfying condition (2) of Definition 2. So far the only known non-cyclotomic sparse families with k3,4,6, are Freeman’s family for k=10, with ρ(q,t,r)=1, Dryło’s two examples [3] for k=8,12, with ρ(q,t,r)=1.5 and a few examples we presented in [8] for k=5,10, with ρ(q,t,r)=1.5.

Table 8

Non-cyclotomic sparse families for k with φ(k)=4 and ρ(q,t,r)=1.5.

Familykt(x)r(x)g(x)y(x)x0
18-112(x3-3x2-5x-9)x4-2x2+98x2-16-112(x-3)3mod12
28196(x3+6x2-20x+72)x4-8x2+144x2+10172(x2+6x)18mod24
38-13(2x3+5x2+7x+6)x4+4x3+8x2+12x+92x2-4x-1416(-x2-3)3mod6
410-(25x3+20x2+10x+1)25x4+25x3+15x2+5x+115x2+10x+315x2+5x+3x0
512-115(x3-4x2-5x-6)x4-2x3-3x2+4x+1312x2-12x-51-115(x-3){3,23}mod30
612-195(2x3-17x-95)x4-37x2+361x2-37195(3x2+5x-38){19,171}mod190
Table 9

Non-cyclotomic sparse families for k with φ(k)=4 and ρ(q,t,r)=2.

Familykt(x)r(x)g(x)y(x)x0
15x2+2x+2x4+3x3+4x2+2x+13x2+4x-111(10x3+24x2+19x+2){1,5,7}mod11
28-112(x3-8x-16)x4+4x3+4x2+8x2-4x-12-1204(5x3+33x2+14x+16){14,26,86}mod102
38112(x3+3x2-5x+9)x4-2x2+97x2+18x-9-1612(8x3-33x2-52x-15){27,75,87}mod102
4813(2x3+5x2+7x+12)x4+4x3+8x2+12x+93x2+8x+4151(20x3+44x2+91x+117){3,18,21}mod51
51013(x+4)x4+x3+6x2-14x+613x2-12-1891(4x3+18x2-12x+1){5,17,23}mod33
610-14(x2+2x-3)x4+6x3+16x2+26x+313x2-14x-5144(x3+3x2+4x+4){9,15,17}mod22
712-115(x3-4x2-5x-6)x4-2x3-3x2+4x+132x2-2x-4-190(x3+6x2-30x+19)23mod30
812-115(x3-4x2-5x-6)x4-2x3-3x2+4x+136x2-6x-36-1150(3x3-2x2-20x+27){3,23}mod30

We applied Algorithm 1 for embedding degrees 5, 8, 10, 12 and came up with several new sparse families with ρ(q,t,r)2 presented in Tables 8 and 9. The first examples for k=8 and 12 in Table 8 were first produced by Dryło [3]. Recall that as k grows, then degr grows as well and it becomes hard to determine suitable polynomials t(x),r(x) and z(x). This is because in Algorithm 1 the search for non-cyclotomic sparse families is affected by both the coefficients of the element θ, as well as the coefficients of the polynomial z(x). In order to produce the examples of Tables 8 and 9, we used an exhaustive search for coefficients ai[-10,10] of the element θ, and for the coefficients zi[-20,20] of the polynomial z(x) (excluding duplicates as posed in Remark 1), for every i=0,1,,φ(k)-1. In addition, in most examples of non-cyclotomic sparse families, we have considered integer values for both the coefficients of θ and z(x). We argue though that even more examples of families can be constructed by allowing θ and z(x) to have rational coefficients as well. Furthermore, we need to establish some limit for both the coefficients of the element θ of equation (3.1) and the polynomial z(x)[x] to ensure that the resulting polynomial family will have relatively small coefficients.

Remark 2.

In Tables 29 we provide the polynomials t(x),r(x),g(x) and y(x). In particular, the computation of the remaining field polynomial q(x) is straightforward, by using Step (7) of Algorithm 1. More precisely, we use the relation

q(x)=14[t(x)2+g(x)y(x)2].

The last column, named x0, in these tables refers to the congruential conditions that the input x0 must satisfy, in order for the values q(x0),t(x0) and r(x0) to be integers. The entries x0 in some families indicate that the polynomials q(x),t(x) and r(x) are already integer-valued and so there no need to apply any linear transformation.

Example 1.

Let us consider the sparse family 4 in Table 2, for k=8. This is a cyclotomic family and so r(x)=Φ8(x)=x4+1. We set the trace polynomial as t(x)=-x3+1. Taking g(x)=14x2-20x+14 and y(x)=12(x2+2x+1), we obtain the field polynomial

q(x)=14[t(x)2+g(x)y(x)2]=18(9x6+18x5+9x4-8x3+9x2+18x+9).

The field polynomial q(x) is integer-valued for all x1mod2. This can easily be seen by applying on q(x) the linear transformation x(2z+1), where we obtain

q(z)=72z6+288z5+468z4+388z3+177z2+48z+8,

which has integer coefficients. Hence we have a sparse family (q(x),t(x),r(x)) of pairing-friendly elliptic curves with embedding degree 8 and ρ(q,t,r)=1.5. All families in Tables 29 are created in the same way.

4 Implementation and experimental results

Suitable pairing-friendly triples (q,t,r) can be obtained by the solutions of a generalized Pell equation. We describe this procedure in detail and present numerical examples of pairing-friendly parameters as a result of the sparse families we constructed in the previous section.

4.1 Finding pairing-friendly parameters with sparse families

With the notation of Section 3, let DY2=f(x)=g(x)y(x)2 and g(x)=ax2+bx+c, for some a,b,c. As stated in [4], we can omit the term y(x)2 from calculations and so the above equation is DY2=ax2+bx+c. Multiplying both sides by a factor S>0 such that aS is a perfect square, we obtain SDY2=aSx2+bSx+cS. Let aS=A2 and b=2ABS, for some A,B. Substituting, we obtain SDY2=(Ax)2+2ABx+cS. Completing the squares and setting B2-cS=T and Ax+B=X, we conclude to a generalized Pell equation of the form

(4.1)X2-SDY2=T.

We need to find a solution (X,Y) for square free values of D such that X=Ax0+B, for some x0. For each solution we check if q(x0) and r(x0) are both primes of a desired size and if such a x0 exists, we set q=q(x0), t=t(x0), r=r(x0) and #E(𝔽q)=q+1-t. By [21], we can increase the possibility of finding such parameters by allowing r to contain a small factor. In this case we set r=1nr(x0), for some relatively small n>0. This procedure is summarized in Algorithm 2.

Algorithm 2 (Finding pairing-friendly parameters using sparse families.).

Remark 3.

If a generalized Pell equation is solvable, then it has an infinite number of solutions and by equation (4.3) it is clear that these solutions grow very fast. However, we only need a finite number of them. In particular, if (X,Y) is a solution for equation (4.1), with X=Ax0+B, then as X grows, so does x0. Therefore, we set a limit Xmax for the size of X to guarantee that q(x0) and r(x0) will have approximately the size that we require.

Details on solving generalized Pell equations of the form (4.1) can be found in [18, 20]. The main strategy requires first to find the fundamental solution of the standard Pell equation

(4.2)U2-SDV2=1,

by computing the simple continued fraction expansion of SD. This fundamental solution is the smallest integer pair (U0,V0) satisfying equation (4.2) and according to [18, 20], such a pair always exists. On the contrary, equation (4.1) is not necessarily solvable for every D. If it is, then there is an infinite number of solutions (Xi,Yi) obtained by the recurrence relation

(4.3)Xi+YiSD=(X0+Y0SD)(U0+V0SD)i,

for each i=0,1,, where X0,Y0>0 and Y0 is the smallest compared to the other Yi. The pair (X0,Y0) is called the fundamental solution of equation (4.1) and all pairs (Xi,Yi) obtained by the above relation lie in the same class of solutions. However, a generalized Pell equation may have more than one classes of solutions and so more than one fundamental solutions (see [18, 20]).

Now consider the generalized Pell equation (4.1) and suppose that T is a perfect square. Such Pell equations have the advantage that they are always solvable for every positive and square-free integer D. Clearly if (U0,V0) is the fundamental solution of the standard Pell equation (4.2), the pair (X0,Y0)=(TU0,TV0) is a fundamental solution of equation (4.1). This attribute increases the possibility of finding suitable elliptic curve parameters, since there are more D to test. These special Pell equations correspond to sparse families (q(x),t(x),r(x)) with g(x) that factors as a product of two linear terms. Indeed, consider the generalized Pell equation (4.1) with T a perfect square and X=Ax+B. Then we have

DY2=g(x)=A2Sx2+2ABSx+B2-TS,

where the discriminant of this polynomial is 4TA2S2>0, a perfect square. Thus the polynomial g(x) factors over [x]. Such families are called effective and there are many examples for k{3,4,6} (see [4, 7]) as well as an example for k=5 in [8]. Here we introduce two effective sparse families for k=10 and ρ(q,t,r)=1.5 with g(x)=3x2+10x+3 and g(x)=15x2+50x+15 in Table 2. The families for k=5,10 in Table 5 and all non-cyclotomic sparse families of Table 9 are also effective.

4.2 Numerical examples

Recall that for a pairing on an elliptic curve E/𝔽q is defined as e^:𝔾1×𝔾2𝔾T, for some r-order subgroups 𝔾1,𝔾2E(𝔽q) and 𝔾T𝔽qk*. Using Algorithm 2, we are looking for pairing-friendly triples (q,t,r), for some fixed embedding degree k, such that q,r are both primes.

The prime r is chosen such that the DLP in 𝔾1,𝔾2 is hard. Recall from Section 1 that the complexity of the DLP in such groups is O(r) and the provided security level is logr2. The complexity of the DLP in a finite field 𝔽N is measured asymptotically by the L-function

(4.4)LN[,c]=exp[(c+o(1))(lnN)(lnlnN)1-],

for some real constants [0,1] and c>0, where in our case we have N=qk. For prime embedding degrees, the complexity of the DLP in 𝔽N is LN[13,1.923]. For composite k, this complexity is reduced to LN[13,1.526], due to the exTNFS and SexTNFS methods [13, 16]. This causes us to consider larger extension fields than the ones proposed in Table 1 for this case.

Table 10

Pairing-friendly parameters from cyclotomic sparse families of Tables 24 with ρ<2.

kFamilyDx0nlogrklogqρ
8Table 2, Family 413,55711130899497270133550374511mod2343143,8321.5255
632,9011252602986578658247362969151mod24,6583344,1601.5569
10Table 2, Family 646,1698564677136874378656972mod11112744,1501.5146
509,605-358449450711565924025081672mod11113365,0701.5089
972,7212309325829677051348160296332mod11113465,2301.5116
10Table 2, Family 79,214-35823853385080807203702896432mod55113625,4701.5110
197188644212459195367276564552083313mod55113986,0101.5101
192,67896943159517690080113333313mod55113154,7601.5111
14Table 3, Family 41,897,633174689825771798897971mod273808,9741.6868
18Table 3, Family 61,875,283249209193077944mod377032577,9741.7237
Table 11

Pairing-friendly parameters from non-cyclotomic sparse families of Table 8 with ρ<2.

kFamilyDx0nlogrklogqρ
8125,358201148570767293008984881635793mod12723694,4321.5014
82246,526913658803736551658777538618mod241,1523213,8641.5047
831,480,462-12783449745074162334501206973mod62,0343494,2961.5387
104145,0822319023040403787150051816713415,1501.5103
358,403164710065572779002137065655713665,5201.5082
1251,093,821139015455584646579850411576970323mod302253927,0801.5051
Table 12

Pairing-friendly parameters from cyclotomic sparse families of Tables 57 with ρ2.

kFamilyDx0nlogrklogqρ
5Table 5, Family 141,483-2111597552865494243725mod11112662,6802.0150
7Table 6, Family 274,0474038705881236531mod212914,1022.0137
7Table 6, Family 336,56582916783673271mod212573,6262.0156
7Table 6, Family 5166,382303704003132931mod9115,8632343,4512.1068
8Table 5, Family 4568,17724580049264790716162979,2662714,5682.1070
8Table 5, Family 6727,20312326500311129150138715911mod223195,1442.0157
10Table 5, Family 765596102640242882575418mod11112595,2402.0232
136,307-62698230151597165967638mod112,7612785,7702.0755
10Table 5, Family 812,4152476393097136084172772mod117812615,3602.0536
2,982-2070566347946992361640754mod1113096,1401.9871
26,131-1202823396073349127466676mod11113036,0802.0066
10Table 5, Family 92,54960293947147742734876227328mod55300,6412976,2802.1145
14Table 6, Family 123,949249018105529144030847696971mod2749,68748614,2102.0885

As stated earlier, in [6] it is recommended to use elliptic curves with large CM discriminant and particularly discriminants up to 1013 (see [22]). However, a very large discriminant would affect the efficiency of the CM method. In our examples we have considered CM discriminants D<2,000,000. We argue though that if we increase the values of D, more examples can be found. In Tables 1013 we give our numerical examples obtained by the sparse families of Section 3 and the solutions of their corresponding Pell equations. In all cases we are aiming at a security level of at least 128-bits in all three groups 𝔾1,𝔾2 and 𝔾T. This corresponds to primes r with logr256-bits. In Tables 10 and 11 we present pairing-friendly parameters with ρ<2 obtained by cyclotomic and non-cyclotomic sparse families, respectively. In Tables 12 and 13 we present examples of suitable parameters with ρ2 from cyclotomic and non-cyclotomic families of Section 3. In each table the integer x0 refers to the input of the polynomials q(x),t(x) and r(x). In particular, recall that x0 satisfies the coordinate X of the solution (X,Y) of a generalized Pell equation

X2-SDY2=Twith X=Ax+B

and thus x0=1A(X-B). In addition, each x0 satisfies the congruential restrictions of Tables 27, which guarantee that the values q(x0),t(x0) and r(x0) are integers.

Table 13

Pairing-friendly parameters from non-cyclotomic sparse families of Table 9 with ρ2.

kFamilyDx0nlogrklogqρ
51147,04314498163869183850973007mod11301,0812622,8052.1412
82305171158629679037251523886mod1021,2242714,4082.0332
8369,52940896513251905360919672127mod102314,5682954,9202.0847
100,622-1240208270400688959170775mod102500,6162744,6002.0985
335,435-808909823482987887936387mod1021,2242804,5602.0357
394,494-15168134472145211882102032569987mod1021,2243776,1042.0239
10590,041-5691607162356648176999817mod33188,0012845,8802.0704
491,801-317387769998079715002378005223mod33669,1413467,1402.0636
1272,267-271505200325762572057728723mod3024,5253107,6202.0484
29,307-3460276463577462603973584723mod302253317,9682.0060
66,693993524169783543999486231279473323mod302,9254009,7082.0225
69,883-62276417310242188211778885433320723mod3022542710,2842.0070
1283,459119981819249830322611233mod30852,9252736,9122.1099
3,497268570905811973494829394750033mod30253738,9281.9946
6,715185388458754090270094126512768033mod3017,7254019,8402.0449
10,12711325184622530709124333mod30252756,5761.9927
10,1874998022941345139622220291240033mod30253899,3362.0000
10,44218130863313213716899431634433mod30253578,5561.9972
23,865266295691130809857772097878200033mod30304,5253999,8882.0652
25,8537253318001042160020198102094022433mod302,72542510,3442.0282
34,77060546072614600724367104033mod30322,8253107,7642.0871
88,84231279094228255786690918433mod30253207,6802.0000

The integer n denotes the small factor of r(x0), in which case we set the prime r as r=1nr(x0). In our experiments, this small factor is taken to be up to 10,000, or even larger (106) in some examples. Finally, logr and klogq refer to the size of the prime r and the size extension field 𝔽qk, respectively. The pairing-friendly parameters presented in Tables 12 and 13 are the first examples obtained from sparse families for various embedding degrees with ρ2. The examples of Table 13 are produced from effective sparse families and this is why it contains more examples than the others. Particularly the examples obtained by Family 8 of Table 9 are more than any other sparse family we examined. Notice that we have found ten examples of pairing-friendly parameters in this case for Dmax=100,000.

Remark 4.

Using the value x0 in Tables 1013, we can extract the elliptic curve parameters q,t and r in the following way: we find the corresponding sparse family in Tables 29, indicated in the second column, and evaluate the polynomials t(x) and r(x) at x0. Then we set t=t(x0) and r=1nr(x0), where n is given in the fifth column of Tables 1013. For the prime q we set

q=q(x0)=14[t(x0)2+g(x0)y(x0)2].

In some cases the value y(x0) is not an integer, thus it might contain a factor 1s. This does not affect the elliptic curve parameters (q,t,r) since in all such examples s2 divides g(x0) and hence g(x0)y(x0)2 is always an integer in our examples. Alternatively, recall that we want g(x0)y(x0)2=DY2, for some square-free CM discriminant D>0, which is given in the third column of Tables 1013 and an integer Y. In all of our examples we have that g(x0)y(x0)2D=Y2, i.e. a perfect square integer, where y(x0) is not necessarily an integer.

The results in these tables justify our claim that sparse families with ρ(q,t,r)=2 are likely to offer a nice balance between the security levels in the three defining groups of a pairing. For instance, suppose that k=8, ρ(q,t,r)=1.5 and logr=256. A simple calculation using equation (4.4) shows that the asymptotic complexity of the DLP in 𝔽q8 is Lq8[13,1.526]110-bits. If we choose a family with ρ(q,t,r)=2, then this complexity increases to approximately 124-bits, which is very close to the intended security level. On the other hand, for prime embedding degrees, consider a sparse family with k=5 and ρ(q,t,r)=1.5. For an 128-bit security level such families are invalid, since the complexity of the DLP in 𝔽q5 is Lq5[13,1.923]114-bits. However, choosing a family with ρ(q,t,r)=2, we obtain a security level of 128-bits in the target group.

Analogous conclusions can be made for other embedding degrees and higher security levels as well. For example Freeman’s family for k=10 and ρ(q,t,r)=1 was considered to be one of the ideal examples for implementations, since it was designed to offer a 128-bit security level in 𝔾1,𝔾2 and 𝔾T, with logr=logq=256-bits. For a 256-bit prime r, this family corresponds to an extension field of size 10logq=2,560. Nowadays, since k=10 is composite, the complexity of the DLP in 𝔽q10 is Lq10[13,1.526]102-bits, far from the ideal case. In order to increase the security level in the extension field, when k=10, we need to consider families with ρ(q,t,r)1.5. More precisely, a family with ρ(q,t,r)=1.5 results in Lq10[13,1.526]121-bits, but if we allow a relatively small cofactor n we will achieve a 128-bits security level.

The final example describes how the first entry in Table 10 is extracted. All examples in Tables 1013 are produced in the same manner.

Example 2.

Let us consider the sparse family of Example 1 for k=8. Recall that g(x)=14x2-20x+14. Setting DY2=g(x), we can construct the corresponding generalized Pell equation by multiplying by 14 and completing the squares, in which case we obtain

X2-14DY2=-96,where X=14x-10.

Solving this equation for D=1 up to some bound Dmax, we get that for D=13557 the pair

(X,Y)=(15583259296178186970524304,35769468027929990781812)

is a solution for the above generalized Pell equation, for which

X=15583259296178186970524304=141113089949727013355037451-10.

Thus we set x0=1113089949727013355037451 and since x01mod2, we evaluate the sparse family at x0, where we obtain

t(x0)=-1379084204816568967933565988445878273074793788662578724629722098991244850,
y(x0)=22158635240623429255980388671224235145707357764136130917507889201547424,
r(x0)=34×45148375535546851220441313205535640794971749131498385771772024669829
862187278745767097241644553,
q(x0)=213960739947136689034610442989168775540567702119257861043429595757767560
4025877858790410611192643075676809571228408106790542831484411761383384433.

Note that here r(x0) is nearly prime, i.e. it contains a small factor n=34. Thus, the prime dividing the order of the curve is r=134r(x0). The size of the prime r is logr=314-bits and the base prime is q=q(x0) with logq=479-bits, producing an extension field of size 8logq=3832-bits. Finally, the trace of Frobenius is t=t(x0) and for these parameters we have ρ=1.5255.

5 Conclusion

In this paper, we presented a method for constructing sparse families of pairing-friendly elliptic curves and applied it for various embedding degrees. In Section 3 we have presented examples of sparse families with ρ-values up to 2. We argue that families with ρ(q,t,r)=2 are likely to offer a nice balance between the size of the prime r, representing the order of a subgroup 𝔾 of #E(𝔽q) and the size of the extension field 𝔽qk. In Section 4 we presented extensive numerical results to support our claims. The pairing-friendly parameters we produced provide a balanced security level between 𝔾 and 𝔽qk for both composite and prime values of k, with ρ2 and relatively large CM discriminant. Finally, we note that the numerical results presented in this paper are the first in the literature for sparse families of various embedding degrees.


Communicated by Alfred Menezes


Acknowledgements

We thank the anonymous referees for their valuable comments and suggestions that helped us improve this paper.

References

[1] P. S. L. M. Barreto and M. Naehrig, Pairing-friendly elliptic curves of prime order, Selected Areas in Cryptography, Lecture Notes in Comput. Sci. 3897, Springer, Berlin (2006), 319–331. 10.1007/11693383_22Search in Google Scholar

[2] F. Brezing and A. Weng, Elliptic curves suitable for pairing based cryptography, Des. Codes Cryptogr. 37 (2005), no. 1, 133–141. 10.1007/s10623-004-3808-4Search in Google Scholar

[3] R. Drył o, On constructing families of pairing-friendly elliptic curves with variable discriminant, Progress in Cryptology – INDOCRYPT, Lecture Notes in Comput. Sci. 7107, Springer, Berlin (2011), 310–319. 10.1007/978-3-642-25578-6_22Search in Google Scholar

[4] P. Duan, S. Cui and C. W. Chan, Finding more non-supersingular elliptic curves for pairing-based cryptosystems, Int. J. Inf. Tech. 2 (2005), no. 2, 157–163. Search in Google Scholar

[5] R. Dupont, A. Enge and F. Morain, Building curves with arbitrary small MOV degree over finite prime fields, J. Cryptology 18 (2005), no. 2, 79–89. 10.1007/s00145-004-0219-7Search in Google Scholar

[6] N. El Mrabet and M. Joye, Guide to Pairing-Based Cryptography, CRC Press, Boca Raton, 2017. 10.1201/9781315370170Search in Google Scholar

[7] G. Fotiadis and E. Konstantinou, On the efficient generation of generalized MNT elliptic curves, Algebraic Informatics, Lecture Notes in Comput. Sci. 8080, Springer, Berlin (2013), 147–159. 10.1007/978-3-642-40663-8_15Search in Google Scholar

[8] G. Fotiadis and E. Konstantinou, More sparse families of pairing-friendly elliptic curves, Cryptology and Network Security – CANS’14, Lecture Notes in Comput. Sci. 8813, Springer, Cham (2014), 384–399. 10.1007/978-3-319-12280-9_25Search in Google Scholar

[9] D. Freeman, Constructing pairing-friendly elliptic curves with embedding degree 10, Algorithmic Number Theory, Lecture Notes in Comput. Sci. 4076, Springer, Berlin (2006), 452–465. 10.1007/11792086_32Search in Google Scholar

[10] D. Freeman, M. Scott and E. Teske, A taxonomy of pairing-friendly elliptic curves, J. Cryptology 23 (2010), no. 2, 224–280. 10.1007/s00145-009-9048-zSearch in Google Scholar

[11] S. D. Galbraith, J. F. McKee and P. C. Valença, Ordinary abelian varieties having small embedding degree, Finite Fields Appl. 13 (2007), no. 4, 800–814. 10.1016/j.ffa.2007.02.003Search in Google Scholar

[12] E. J. Kachisa, E. F. Schaefer and M. Scott, Constructing Brezing–Weng pairing-friendly elliptic curves using elements in the cyclotomic field, Pairing-Based Cryptography – Pairing 2008, Lecture Notes in Comput. Sci. 5209, Springer, Berlin (2008), 126–135. 10.1007/978-3-540-85538-5_9Search in Google Scholar

[13] T. Kim and R. Barbulescu, Extended tower number field sieve: A new complexity for the medium prime case, Advances in Cryptology – CRYPTO 2016. Part I, Lecture Notes in Comput. Sci. 9814, Springer, Berlin (2016), 543–571. 10.1007/978-3-662-53018-4_20Search in Google Scholar

[14] H.-S. Lee and C.-M. Park, Generating pairing-friendly curves with the CM equation of degree 1, Pairing-Based Cryptography – Pairing 2009, Lecture Notes in Comput. Sci. 5671, Springer, Berlin (2009), 66–77. 10.1007/978-3-642-03298-1_5Search in Google Scholar

[15] H.-S. Lee and C.-M. Park, Constructing pairing-friendly curves with variable CM discriminant, Bull. Korean Math. Soc. 49 (2012), no. 1, 75–88. 10.4134/BKMS.2012.49.1.075Search in Google Scholar

[16] A. Menezes, P. Sarkar and S. Singh, Challenges with assessing the impact of NFS advances on the security of pairing-based cryptography, preprint (2016), https://eprint.iacr.org/2016/1102.pdf. 10.1007/978-3-319-61273-7_5Search in Google Scholar

[17] A. Miyaji, M. Nakabayashi and S. Takano, New explicit conditions of elliptic curve traces for FR-reduction, IEICE Trans Fundam. Electron. Commun. Comput. Sci. 84 (2001), no. 5, 1234–1243. Search in Google Scholar

[18] R. A. Mollin, Simple continued fraction solutions for Diophantine equations, Expo. Math. 19 (2001), no. 1, 55–73. 10.1016/S0723-0869(01)80015-3Search in Google Scholar

[19] Y. Nogami, E. Yanagi, T. Izuta and Y. Morikawa, Ordinary pairing Friendly curve of embedding degree 1 whose order has two large prime factors, Mem. Fac. Eng. Okayama Univ. 45 (2011), 46–53. Search in Google Scholar

[20] J. P. Robertson, Solving the generalized Pell equation x2-Dy2=N, preprint (2004), http://jpr2718.org/pell.pdf. Search in Google Scholar

[21] M. Scott and P. S. L. M. Barreto, Generating more MNT elliptic curves, Des. Codes Cryptogr. 38 (2006), no. 2, 209–217. 10.1007/s10623-005-0538-1Search in Google Scholar

[22] A. V. Sutherland, Computing Hilbert class polynomials with the Chinese remainder theorem, Math. Comp. 80 (2011), no. 273, 501–538. 10.1090/S0025-5718-2010-02373-7Search in Google Scholar

[23] S. Tanaka and K. Nakamula, Constructing pairing-friendly elliptic curves using factorization of cyclotomic polynomials, Pairing-Based Cryptography – Pairing 2008, Lecture Notes in Comput. Sci. 5209, Springer, Berlin (2008), 136–145. 10.1007/978-3-540-85538-5_10Search in Google Scholar

[24] K. Yoon, A new method of choosing primitive elements for Brezing–Weng families of pairing-friendly elliptic curves, J. Math. Cryptol. 9 (2015), no. 1, 1–9. 10.1515/jmc-2013-0017Search in Google Scholar

Received: 2017-5-11
Revised: 2018-2-6
Accepted: 2018-2-6
Published Online: 2018-2-20
Published in Print: 2018-6-1

© 2018 Walter de Gruyter GmbH, Berlin/Boston

This article is distributed under the terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

Downloaded on 13.3.2025 from https://www.degruyter.com/document/doi/10.1515/jmc-2017-0024/html
Scroll to top button