Counting points on twisted Edwards curves over finite fields
DOI:
https://doi.org/10.54654/isj.v1i16.912Keywords:
counting points, twisted Edwards curve, Montgomery curve, Weierstrass curve, elliptic curveTóm tắt
Abstract— In this paper, we are interested in counting points on a twisted Edwards curve defined over a finite field. In particular, we construct explicit formulae allowing to determine exactly the number of k-rational points on a twisted Edwards curve when the number of k-rational points on the birational equivalent curve of Weierstrass or Montgomery form respectively is known. Using these formulae, we introduce an algorithm to count points on the twisted Edwards curve define over a finite field.
Downloads
References
. FIPS 186-5. Digital signature standard (dss). Technical report, 2021.
. Marta Bellés-Munoz, Barry Whitehat, ˜ Jordi Baylina, Vanesa Daza, and Jose Luis Munoz-Tapia. Twisted edwards elliptic curves for zero-knowledge circuits. Mathematics, 9(23):3022, 2021.
. Daniel J Bernstein, Peter Birkner, Marc Joye, Tanja Lange, and Christiane Peters. Twisted edwards curves. In International Conference on Cryptology in Africa, pages 389–405. Springer, 2008.
. Daniel J Bernstein, Peter Birkner, Tanja Lange, and Christiane Peters. Optimizing double-base elliptic-curve single-scalar multiplication. In International Conference on Cryptology in India, pages 167–182. Springer, 2007.
. Daniel J Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang. High-speed high-security signatures. Journal of cryptographic engineering, 2(2):77–89, 2012.
. Daniel J Bernstein and Tanja Lange. Faster addition and doubling on elliptic curves. In international conference on the theory and application of cryptology and information security, pages 29–50. Springer, 2007.
. Ian Blake, Gerald Seroussi, Gadiel Seroussi, and Nigel Smart. Elliptic curves in cryptography, volume 265. Cambridge
university press, 1999.
. Harold Edwards. A normal form for elliptic curves. Bulletin of the American mathematical society, 44(3):393–422,
. Huseyin Hisil, Kenneth Wong, Gary Carter, and Ed Dawson. Faster group operations on elliptic curves. In Information Security 2009: proceedings of the 7th Australasian Information Security Conference, pages 7–19. Australian Computer Society, 2009.
. Simon Josefsson and Ilari Liusvaara. Edwards-curve digital signature algorithm (eddsa). Technical report, 2017.
. Adam Langley, Mike Hamburg, and Sean Turner. Elliptic curves for security.
Technical report, 2016.
. Christiane Peters. Curves, Codes, and Cryptography. PhD thesis, PhD thesis, Technische Universiteit Eindhoven, 2011.
. René Schoof. Elliptic curves over finite fields and the computation of square roots mod p. Mathematics of computation,
(170):483–494, 1985.
. René Schoof. Counting points on elliptic curves over finite fields. Journal de théorie des nombres de Bordeaux, 7(1):219–254, 1995.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).