degree of twist is 8 which is half of the embedding de-
gree to avoid performing arithmetic on divisor classes
defined over the extension field. We described that
some techniques to reduce the computation cost as de-
scribed in (Fan et al., 2008) can apply to our twisted
Ate pairing.
As shown in our cost estimates, the final exponen-
tiation cost is much larger than the stat-of-the-art el-
liptic pairing. We should consider other embedding
degree such as k = 12 to reduce complicated multi-
exponentiation, although we cannot take appropriate
r as an order of Jacobian whose size is close to 384-
bit. The other alternative, we consider to take k = 15
or 27 so that the embedding degrees are coprime to
degree of the twist. In this case, we can construct
twisted pairings whose length of Miller loop are op-
timal unlike the situation in 4.2. We will tackle to
construct the curves which have the above embedding
degrees and a twisted Ate pairing on each curve as a
future work. In addition, other pairing-friendly or-
dinary curves of genus 2 like (Freeman and Satoh,
2011) should be explored whether these curves are
appropriate for constructing pairings at high security
level.
Furthermore, we should explicitly construct ex-
tension fields and optimize the arithmetic on these
field to obtain detailed cost estimate. We will imple-
ment the pairing on Haswell CPU using the SIMD
instructions (AVX2) and show experimental result in
practice.
REFERENCES
Aranha, D., Fuentes-Castaeda, L., Knapp, E., Menezes, A.,
and Rodrguez-Henrquez, F. (2013). Implementing
pairings at the 192-bit security level. In Abdalla, M.
and Lange, T., editors, Pairing-Based Cryptography
Pairing 2012, volume 7708 of Lecture Notes in Com-
puter Science, pages 177–195. Springer Berlin Hei-
delberg.
Balakrishnan, J., Belding, J., Chisholm, S., Eisentr
¨
ager, K.,
Stange, K. E., and Teske, E. (2009). Pairings on hy-
perelliptic curves. CoRR, abs/0908.3731, Available:
http://arxiv.org/abs/0908.3731v2.
Barbulescu, R., Gaudry, P., Guillevic, A., and Morain, F.
(2015). Improving NFS for the discrete logarithm
problem in non-prime finite fields. In Oswald, E.
and Fischlin, M., editors, Advances in Cryptology –
EUROCRYPT 2015, volume 9056 of Lecture Notes
in Computer Science, pages 129–155. Springer Berlin
Heidelberg.
Barbulescu, R., Gaudry, P., Joux, A., and Thom, E. (2014).
A heuristic quasi-polynomial algorithm for discrete
logarithm in finite fields of small characteristic. In
Nguyen, P. and Oswald, E., editors, Advances in Cryp-
tology EUROCRYPT 2014, volume 8441 of Lec-
ture Notes in Computer Science, pages 1–16. Springer
Berlin Heidelberg.
BlueKrypt (2012). - cryptographic key length recommen-
dation, http://www.keylength.com.
Bosma, W., Cannon, J., and Playoust, C. (1997). The
Magma algebra system. I. The user language. J. Sym-
bolic Comput., 24(3-4):235–265. Computational al-
gebra and number theory (London, 1993).
Fan, X., Gong, G., and Jao, D. (2008). Speeding up pair-
ing computations on genus 2 hyperelliptic curves with
efficiently computable automorphisms. In Galbraith,
S. and Paterson, K., editors, Pairing-Based Cryptog-
raphy Pairing 2008, volume 5209 of Lecture Notes
in Computer Science, pages 243–264. Springer Berlin
Heidelberg.
Fan, X., Gong, G., and Jao, D. (2009). Efficient pairing
computation on genus 2 curves in projective coordi-
nates. In Avanzi, R., Keliher, L., and Sica, F., ed-
itors, Selected Areas in Cryptography, volume 5381
of Lecture Notes in Computer Science, pages 18–34.
Springer Berlin Heidelberg.
Freeman, D. M. and Satoh, T. (2011). Constructing pairing-
friendly hyperelliptic curves using weil restriction.
Journal of Number Theory, 131(5):959 – 983. Elliptic
Curve Cryptography.
Frey, G. and Lange, T. (2006). Fast bilinear maps from the
tate-lichtenbaum pairing on hyperelliptic curves. In
Hess, F., Pauli, S., and Pohst, M., editors, Algorith-
mic Number Theory, volume 4076 of Lecture Notes
in Computer Science, pages 466–479. Springer Berlin
Heidelberg.
Galbraith, S. D., Lin, X., and Morales, D. J. M. (2008).
Pairings on hyperelliptic curves with a real model. In
Galbraith, S. and Paterson, K., editors, Pairing-Based
Cryptography – Pairing 2008, volume 5209 of Lecture
Notes in Computer Science, pages 265–281. Springer-
Verlag.
Granger, R., Hess, F., Oyono, R., Thriault, N., Vercauteren,
F., and Berlin, T. U. (2007). Ate pairing on hyperel-
liptic curves. In In Advances in Cryptology EURO-
CRYPT 2007, pages 419–436. Springer-Verlag.
Guillevic, A. and Vergnaud, D. (2013). Genus 2 hyperellip-
tic curve families with explicit jacobian order evalua-
tion and pairing-friendly constructions. In Abdalla,
M. and Lange, T., editors, Pairing-Based Cryptog-
raphy Pairing 2012, volume 7708 of Lecture Notes
in Computer Science, pages 234–253. Springer Berlin
Heidelberg.
Hess, F. (2008). Pairing lattices. In Galbraith, S. and Pater-
son, K., editors, Pairing-Based Cryptography – Pair-
ing 2008, volume 5209 of Lecture Notes in Computer
Science, pages 18–38. Springer-Verlag.
Kachisa, E. (2010). Generating more kawazoe-takahashi
genus 2 pairing-friendly hyperelliptic curves. In Joye,
M., Miyaji, A., and Otsuka, A., editors, Pairing-Based
Cryptography - Pairing 2010, volume 6487 of Lecture
Notes in Computer Science, pages 312–326. Springer
Berlin Heidelberg.
Kawazoe, M. and Takahashi, T. (2008). Pairing-friendly
hyperelliptic curves with ordinary jacobians of type
ICISSP 2016 - 2nd International Conference on Information Systems Security and Privacy
438