Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Saved research
Cart
  1. Home
  2. Cryptographic Hardware and Embedded Systems – CHES 2005
  3. Conference paper

Hardware Acceleration of the Tate Pairing in Characteristic Three

  • Conference paper
  • pp 398–411
  • Cite this conference paper
Cryptographic Hardware and Embedded Systems – CHES 2005 (CHES 2005)
Hardware Acceleration of the Tate Pairing in Characteristic Three
  • P. Grabher18 &
  • D. Page19 

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3659))

Included in the following conference series:

  • International Workshop on Cryptographic Hardware and Embedded Systems
  • 3246 Accesses

  • 43 Citations

Abstract

Although identity based cryptography offers many functional advantages over conventional public key alternatives, the computational costs are significantly greater. The core computational task is evaluation of a bilinear map, or pairing, over elliptic curves. In this paper we prototype and evaluate polynomial and normal basis field arithmetic on an FPGA device and use it to construct a hardware accelerator for pairings over fields of characteristic three. The performance of our prototype improves roughly ten-fold on previous known hardware implementations and orders of magnitude on the fastest known software implementation. As a result we reason that even on constrained devices one can usefully evaluate the pairing, a fact that gives credence to the idea that identity based cryptography is an ideal partner for identity aware smart-cards.

The work described in this paper has been supported in part by the European Commission through the IST Programme under Contract IST-2002-507932 ECRYPT. The information in this document reflects only the author’s views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

Hardware Implementations of Pairings at Updated Security Levels

Chapter © 2022

Pairing-Based Cryptography on Elliptic Curves

Article 27 June 2018

Design and FPGA implementation of an area-efficient elliptic curve cryptographic processor

Article 18 April 2026

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Biometrics
  • Computational Number Theory
  • Cryptology
  • DNA computing and cryptography
  • Hardware and infrastructure
  • Personal Computing
  • Elliptic Curve Cryptography Architectures and Algorithms

References

  1. Barreto, P.S.L.M.: A Note On Efficient Computation Of Cube Roots In Characteristic 3. In: Cryptology ePrint Archive, Report 2004/305 (2004)

    Google Scholar 

  2. Barreto, P.S.L.M., Galbraith, S., O’hEigeartaigh, C., Scott, M.: Efficient Pairing Computation on Supersingular Abelian Varieties. In: Cryptology ePrint Archive, Report 2004/375 (2004)

    Google Scholar 

  3. Barreto, P.S.L.M., Lynn, B., Scott, M.: Constructing Elliptic Curves with Prescribed Embedding Degree. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 257–267. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Barreto, P.S.L.M., Kim, H., Lynn, B., Scott, M.: Efficient Algorithms for Pairing-Based Cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354–368. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Barreto, P.S.L.M., Naehrig, M.: Pairing-Friendly Elliptic Curves of Prime Order. In: Cryptology ePrint Archive, Report 2005/133 (2005)

    Google Scholar 

  6. Bertoni, G., Guajardo, J., Kumar, S., Orlando, G., Paar, C., Wollinger, T.: Efficient GF(p m) Arithmetic Architectures for Cryptographic Applications. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 158–175. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Blake, I.F., Seroussi, G., Smart, N.P.: Advances in Elliptic Curve Cryptography. Cambridge University Press, Cambridge (2004)

    Google Scholar 

  8. Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SIAM Journal on Computing 32(3), 586–615 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  9. Clark, W., Liang, J.: On Arithmetic Weight for a General Radix Representation of Integers. IEEE Transactions on Information Theory 19, 823–826 (1973)

    Article  MATH  MathSciNet  Google Scholar 

  10. Duursma, I., Lee, H.: Tate Pairing Implementation for Hyperelliptic Curves y 2 = x p − x + d. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 111–123. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Dutta, R., Barua, R., Sarkar, P.: Pairing-Based Cryptographic Protocols: A Survey. In: Cryptology ePrint Archive, Report 2004/064 (2004)

    Google Scholar 

  12. Galbraith, S.: Supersingular Curves in Cryptography. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 495–513. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  13. Granger, R., Page, D., Stam, M.: Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three. In: Cryptology ePrint Archive, Report 2004/157 (2004)

    Google Scholar 

  14. Granger, R., Page, D., Stam, M.: On Small Characteristic Algebraic Tori in Pairing-Based Cryptography. In: Cryptology ePrint Archive, Report 2004/132 (2004)

    Google Scholar 

  15. Harrison, K., Page, D., Smart, N.P.: Software Implementation of Finite Fields of Characteristic Three, for use in Pairing Based Cryptosystems. LMS Journal of Computation and Mathematics 5(1), 181–193 (2002)

    MATH  MathSciNet  Google Scholar 

  16. Itoh, T., Tsujii, S.: A Fast Algorithm for Computing Multiplicative Inverses in GF(2n) Using Normal Bases. Information and Computation 78, 171–177 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  17. Kerins, T., Popovici, E., Marnane, W.P.: Algorithms and Architectures for Use in FPGA Implementations of Identity Based Encryption Schemes. In: Becker, J., Platzner, M., Vernalde, S. (eds.) FPL 2004. LNCS, vol. 3203, pp. 74–83. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  18. Kwon, S.: Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields. In: Cryptology ePrint Archive, Report 2004/303 (2004)

    Google Scholar 

  19. Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transactions on Fundamentals E84-A(5), 1234–1243 (2001)

    Google Scholar 

  20. Menezes, A., Okamoto, T., Vanstone, S.A.: Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field. IEEE Transactions on Information Theory 39, 1639–1646 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  21. Nöcker, M.: Data Structures for Parallel Exponentiation in Finite Fields. PhD Thesis, Universität Paderborn (2001)

    Google Scholar 

  22. Page, D., Smart, N.P.: Hardware Implementation of Finite Fields of Characteristic Three. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 529–539. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  23. Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems Based on Pairings. In: Symposium on Cryptography and Information Security (SCIS) (2000)

    Google Scholar 

  24. Silverman, J.: The Arithmetic of Elliptic Curves. Springer, Heidelberg (1986)

    MATH  Google Scholar 

  25. Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  26. Takagi, T., Yen, S.-M., Wu, B.-C.: Radix-r Non-Adjacent Form. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 99–110. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  27. Voltage Security, Press Release. Gemplus Develops the World’s First Identity-Based Encryption for Smart Cards, Available from, http://www.voltage.com/about/pressreleases/PR041102.htm

Download references

Author information

Authors and Affiliations

  1. Institute for Applied, Information Processing and Communications, Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria

    P. Grabher

  2. Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1RB, United Kingdom

    D. Page

Authors
  1. P. Grabher
    View author publications

    Search author on:PubMed Google Scholar

  2. D. Page
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Editors and Affiliations

  1. IBM Watson Research Center, P.O. Box 704, NY 10598, Yorktown Heights, USA

    Josyula R. Rao

  2. Cryptography & Information Security Laboratory, WPI, Worcester, MA, USA

    Berk Sunar

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Grabher, P., Page, D. (2005). Hardware Acceleration of the Tate Pairing in Characteristic Three. In: Rao, J.R., Sunar, B. (eds) Cryptographic Hardware and Embedded Systems – CHES 2005. CHES 2005. Lecture Notes in Computer Science, vol 3659. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11545262_29

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11545262_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28474-1

  • Online ISBN: 978-3-540-31940-5

  • eBook Packages: Computer ScienceComputer Science (R0)Springer Nature Proceedings Computer Science

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Identity Based Encryption
  • Pairing
  • Elliptic Curve
  • FPGA

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Footer Navigation

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover

Corporate Navigation

  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

162.0.217.198

Not affiliated

Springer Nature

© 2026 Springer Nature