DocumentCode
671840
Title
Efficient elliptic curve parallel scalar multiplication methods
Author
Al-Otaibi, Ahmed ; Al-Somani, Turki F. ; Beckett, Paul
Author_Institution
Sch. of Electr. & Comput. Eng., RMIT Univ., Melbourne, VIC, Australia
fYear
2013
fDate
26-28 Nov. 2013
Firstpage
116
Lastpage
123
Abstract
In this paper we compare the computational complexity of two parallel scalar multiplication methods used to speed up scalar multiplications for Elliptic Curve Cryptography applications. Pre-computations are advantageous only when the elliptic curve point is fixed. However, during secure communication sessions using either public keys or digital signatures, the elliptic curve point depends on the public key of the communicating entities and is therefore session dependent. Hence, a second method that replaces pre-computations with some post-computations, allows the pre-computation overhead to be distributed amongst parallel processors. Thus scalar multiplication can be computed more efficiently using the post-computation method in the more typical case where the elliptic curve point is variable.
Keywords
computational complexity; digital signatures; parallel processing; public key cryptography; telecommunication security; computational complexity; digital signatures; elliptic curve cryptography applications; elliptic curve parallel scalar multiplication methods; elliptic curve point; parallel processors; secure communication sessions; Educational institutions; Elliptic curve cryptography; Elliptic curves; Galois fields; Partitioning algorithms; Program processors; Elliptic Curve Cryptosystem; parallel scalar multiplication;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Engineering & Systems (ICCES), 2013 8th International Conference on
Conference_Location
Cairo
Print_ISBN
978-1-4799-0078-7
Type
conf
DOI
10.1109/ICCES.2013.6707184
Filename
6707184
Link To Document