Hashing into Jacobi Quartic Curves

Jacobi quartic curves are well known for efficient arithmetics in regard to their group law and immunity to timing attacks. Two deterministic encodings from a finite field $$\mathbb {F}_q$$Fq to Jacobi quartic curves are constructed. When $$q\equiv 3\pmod 4$$qi?ź3mod4, the first deterministic encoding based on Skalba's equality saves two field squarings compared with birational equivalence composed with Fouque and Tibouchi's brief version of Ulas' function. When $$q\equiv 2\pmod 3$$qi?ź2mod3, the second deterministic encoding based on computing cube root costs one field inversion less than birational equivalence composed with Icart's function at the cost of four field multiplications and one field squaring. It costs one field inversion less than Alasha's encoding at the cost of one field multiplication and two field squarings. With these two deterministic encodings, two hash functions from messages directly into Jacobi quartic curves are constructed. Additionally, we construct two types of new efficient functions indifferentiable from a random oracle.

[1]  H. Hisil Elliptic curves, group law, and efficient computation , 2010 .

[2]  Marc Joye,et al.  The Jacobi Model of an Elliptic Curve and Side-Channel Analysis , 2003, AAECC.

[3]  Mehdi Tibouchi,et al.  Deterministic Encoding and Hashing to Odd Hyperelliptic Curves , 2010, Pairing.

[4]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[5]  David P. Jablon Strong password-only authenticated key exchange , 1996, CCRV.

[6]  M. Skalba Points on elliptic curves over finite fields , 2005 .

[7]  Ed Dawson,et al.  Jacobi Quartic Curves Revisited , 2009, ACISP.

[8]  Igor E. Shparlinski,et al.  Indifferentiable deterministic hashing to elliptic and hyperelliptic curves , 2012, Math. Comput..

[9]  Ben Lynn,et al.  Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.

[10]  Colin Boyd,et al.  Elliptic Curve Based Password Authenticated Key Exchange Protocols , 2001, ACISP.

[11]  Christiaan E. van de Woestijne,et al.  Construction of Rational Points on Elliptic Curves over Finite Fields , 2006, ANTS.

[12]  M. Ulas Rational points on certain hyperelliptic curves over finite fields , 2007, 0706.1448.

[13]  Sylvain Duquesne,et al.  Tate Pairing Computation on Jacobi's Elliptic Curves , 2012, Pairing.

[14]  Bao Li,et al.  Pairing Computation on Elliptic Curves of Jacobi Quartic Form , 2010, IACR Cryptol. ePrint Arch..

[15]  Bao Li,et al.  About Hash into Montgomery Form Elliptic Curves , 2013, ISPEC.

[16]  Mehdi Tibouchi,et al.  Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves , 2010, LATINCRYPT.

[17]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[18]  Sarvar Patel,et al.  Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.

[19]  Jean-Sébastien Coron,et al.  Efficient Indifferentiable Hashing into Ordinary Elliptic Curves , 2010, CRYPTO.

[20]  Reza Rezaeian Farashahi Hashing into Hessian Curves , 2011, AFRICACRYPT.

[21]  Bao Li,et al.  Construct Hash Function from Plaintext to C34Curves , 2012 .

[22]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[23]  Thomas Icart,et al.  How to Hash into Elliptic Curves , 2009, IACR Cryptol. ePrint Arch..

[24]  Antoine Joux,et al.  Injective Encodings to Elliptic Curves , 2013, ACISP.

[25]  Yehuda Lindell,et al.  Highly-Efficient Universally-Composable Commitments based on the DDH Assumption , 2011, IACR Cryptol. ePrint Arch..

[26]  Kwangjo Kim,et al.  ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.

[27]  Joonsang Baek,et al.  Identity-Based Threshold Decryption , 2004, Public Key Cryptography.

[28]  Jean-Jacques Quisquater,et al.  Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups , 2004, Public Key Cryptography.