On Multi-Scalar Multiplication Algorithms for Register-Constrained Environments

A basic but expensive operation in the implementations of several famous public-key cryptosystems is the computation of the multi-scalar multiplication in a certain finite additive group defined by an elliptic curve. We propose an adaptive window method for the multi-scalar multiplication, which aims to balance the computation cost and the memory cost under register-constrained environments. That is, our method can maximize the computation efficiency of multi-scalar multiplication according to any small, fixed number of registers provided by electronic devices. We further demonstrate that our method is efficient when five registers are available. Our method is further studied in detail in the case where it is combined with the non-adjacent form (NAF) representation and the joint sparse form (JSF) representation. One efficiency result is that our method with the proposed improved NAF n-bit representation on average requires 209n/432 point additions. To the best of our knowledge, this efficiency result is optimal compared with those of similar methods using five registers. Unlike the previous window methods, which store all possible values in the window, our method stores those with comparatively high probabilities to reduce the number of required registers.

[1]  Roberto Maria Avanzi The Complexity of Certain Multi-Exponentiation Techniques in Cryptography , 2004, Journal of Cryptology.

[2]  Da-Zhi Sun,et al.  On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy , 2019, Sensors.

[3]  Georg Fuchsbauer,et al.  Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble , 2019, IACR Cryptol. ePrint Arch..

[4]  Da-Zhi Sun,et al.  A note on asynchronous multi-exponentiation algorithm using binary representation , 2012, Inf. Process. Lett..

[5]  Jiankun Hu,et al.  Batch Public Key Cryptosystem with batch multi-exponentiation , 2016, Future Gener. Comput. Syst..

[6]  Yan Zhu,et al.  Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature , 2020, Frontiers of Computer Science.

[7]  Erkay Savas,et al.  A generic Private Information Retrieval scheme with parallel multi‐exponentiations on multicore processors , 2018, Concurr. Comput. Pract. Exp..

[8]  Debiao He,et al.  A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm , 2019, Frontiers of Computer Science.

[9]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[10]  Dirk Fox,et al.  Digital Signature Standard (DSS) , 2001, Datenschutz und Datensicherheit.

[11]  Bodo Möller Algorithms for Multi-exponentiation , 2001, Selected Areas in Cryptography.

[12]  Ferrell S. Wheeler,et al.  Signed Digit Representations of Minimal Hamming Weight , 1993, IEEE Trans. Computers.

[13]  Wu-chuan Yang,et al.  Fast Multicomputation with Asynchronous Strategy , 2007, IEEE Transactions on Computers.

[14]  Jizhou Sun,et al.  Computational efficiency analysis of Wu et al.'s fast modular multi-exponentiation algorithm , 2007, Appl. Math. Comput..

[15]  A. K. Lenstra,et al.  Multi-exponentiation (cryptographic protocols) , 1994 .

[16]  Daniel M. Gordon,et al.  A Survey of Fast Exponentiation Methods , 1998, J. Algorithms.

[17]  Helmut Prodinger,et al.  Distribution results for low-weight binary representations for pairs of integers , 2004, Theor. Comput. Sci..

[18]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[19]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[20]  J. Solinas Low-Weight Binary Representations for Pairs of Integers , 2001 .

[21]  Fábio Borges,et al.  Parallel algorithms for modular multi-exponentiation , 2017, Appl. Math. Comput..

[22]  Fabien Laguillaumie,et al.  Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions , 2020, Algorithmica.

[23]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[24]  Xiaoyu Ruan,et al.  Left-to-right optimal signed-binary representation of a pair of integers , 2005, IEEE Transactions on Computers.

[26]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[27]  Wu-Chuan Yang,et al.  Analysis of the Dimitrov-Jullien-Miller Recoding Algorithm , 2016, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[28]  Xiao Liu,et al.  Combination in Advance Batch Multi-exponentiation on Elliptic Curve , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[29]  Chi-Sung Laih,et al.  Algorithm of asynchronous binary signed-digit recoding on fast multiexponentiation , 2005, Appl. Math. Comput..

[30]  Graham A. Jullien,et al.  Complexity and Fast Algorithms for Multiexponentiations , 2000, IEEE Trans. Computers.