Computing optimal pairings on abelian varieties with theta functions
David Lubicz1,2, Damien Robert3
1CÉLAR 2IRMAR, Université de Rennes 1 1LFANT Team, IMB & Inria Bordeaux Sud-Ouest
Computing optimal pairings on abelian varieties with theta functions - - PowerPoint PPT Presentation
Computing optimal pairings on abelian varieties with theta functions 10/02/2011 (Luminy) David Lubicz 1,2 , Damien Robert 3 1 CLAR 2 IRMAR, Universit de Rennes 1 1 LFANT Team, IMB & Inria Bordeaux Sud-Ouest Motivations Millers
1CÉLAR 2IRMAR, Université de Rennes 1 1LFANT Team, IMB & Inria Bordeaux Sud-Ouest
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
1
2
3
4
5
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
q, E(q), J (q),
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
gQ(x+P) gQ(x)
∗.
Q) = [ℓ](gQ) = [ℓ]∗[ℓ](Q − 0) = [ℓ]∗(fQ) = (fQ ◦ [ℓ]) so
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
q d /∗ q d ℓ
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
i=0bi2i. Let
1 (y2 − α(x2 −x3) − y3), f 2 = f 2 2 (x2 + (x1 +x3) − α2).
1 (y2 − α(x2 −x3) − y3), f 2 = f 2(x2 + (x1 +x3) − α2).
ℓ
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
xΘ − Θ.
PΘ − ℓΘ and ℓt ∗ QΘ − ℓΘ we have
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
b
b
b
i n
n ).
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
t ∊Z(2)
t ∊Z(2)
t ∊Z(2)
t ∊Z(2)
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
1
2
B2 (x 2 − z 2)2;
3
4
5
1
1 + z 2 1)(x 2 2 + z 2 2);
2
B2 (x 2 1 − z 2 1)(x 2 2 − z 2 2);
3
4
5
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
P0A
PQ
Q0A
QP
λ1
Pλ0 Q
λ0
Pλ1 Q .
λ1
P
λ0
P .
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
P0A
γ2α2 β (2P +Q)
γℓαℓ(ℓ−1) β ℓ−1 (ℓP +Q) = λ′1 PβQ
γ2β 2 α (P + 2Q)
Q0A γℓβ ℓ(ℓ−1) αℓ−1
QαP
P = αℓ2λ0 P,
Q = β ℓ2λ0 Q,
P = γℓα(ℓ(ℓ−1)
P,
Q = γℓβ (ℓ(ℓ−1)
Q,
W,ℓ(P,Q) =
Pλ′0 Q
Pλ′1 Q
Pλ0 Q
Pλ1 Q
T,ℓ(P,Q) =
P
P
P
P
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
∗,±1.
∗,±1 by x + 1/x ∊ k ∗. We want to
∗,±1.
∗,± can be computed as follow:
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
a,Q f b,[a]Q.
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
i
j >i c j q j ,ciq i ,Q(P)
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
q (P +Q) = P + λdQ = P +Q.
q (
q (
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
t ∊Z(2)
t ∊Z(2)
t ∊Z(2)
t ∊Z(2)
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
[BF03]
SIAM Journal on Computing 32.3 (2003), pp. 586–615 (cit. on p. 5). [BLS04]
Journal of Cryptology 17.4 (2004), pp. 297–319 (cit. on p. 5). [Gau07] P . Gaudry. “Fast genus 2 arithmetic based on Theta functions”. In: Journal of Mathematical Cryptology 1.3 (2007), pp. 243–265 (cit. on p. 19). [GPSW06]
fine-grained access control of encrypted data”. In: Proceedings of the 13th ACM conference on Computer and communications security. ACM. 2006, p. 98 (cit. on
[Jou04]
Cryptology 17.4 (2004), pp. 263–276 (cit. on p. 5). [Lan05]
Algebra in Engineering, Communication and Computing 15.5 (2005), pp. 295–328 (cit. on p. 19). [LR10]
Algorithmic Number Theory. Lecture Notes in Comput. Sci. 6197 (July 2010). Ed. by
ANTS-IX, July 19-23, 2010, Proceedings. DOI: 10.1007/978-3-642-14518-6_21. URL: http://www.normalesup.org/~robert/pro/publications/articles/
pairings.pdf. Slides http: //www.normalesup.org/~robert/publications/slides/2010-07-ants.pdf
(cit. on p. 20). [RS09]
cryptography”. In: Journal of Cryptology 22.3 (2009), pp. 330–364 (cit. on p. 14). [SW05]
Cryptology–EUROCRYPT 2005 (2005), pp. 457–473 (cit. on p. 5).
Motivations Miller’s algorithm Abelian varieties Theta functions Optimal pairings
[Ver10]
(2010), pp. 455–461 (cit. on p. 25). [Ver01]
Advances in Cryptology—ASIACRYPT 2001 (2001), pp. 533–551 (cit. on p. 5).