International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 118

Research Paper | Mathematics | Mali | Volume 8 Issue 11, November 2019


BLS Curves with Embedding Degrees 9, 15, 21 and 27 against Small-Subgroup Attacks

Mahamadou Abdou Toure, Karim Samake, Sinaly Traore


Abstract: Pairing Based Cryptography depends on the existence of groups where the DDH problem is easy to solve but the problem CDH is difficult. Barreto, Lynn, and Scott examined criteria for curves of larger embedding degrees that generalize the prior work of Miyaji et al. based on the properties of cyclotomic polynomials. To achieve an average level of security, at least two of the three groups of the pairing must necessarily be subgroups proper to groups of orders composed of large prime factors to resist of the small-subgroup attacks. In this article, we have taken over the article of Barreto, Lynn and Scott by bringing clarifications at the level of some basic formulas, by bringing correctives to the case of power of 3 and adding the general case divisible by 3. This theory has been applied to see its impact on the security of the subgroups in pairing-based cryptography.


Keywords: Pairings, Cryptography, Elliptic Curves, small-subgroup attacks


Edition: Volume 8 Issue 11, November 2019,


Pages: 1173 - 1178


How to Cite this Article?

Mahamadou Abdou Toure, Karim Samake, Sinaly Traore, "BLS Curves with Embedding Degrees 9, 15, 21 and 27 against Small-Subgroup Attacks", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20202834, Volume 8 Issue 11, November 2019, 1173 - 1178

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Cryptography'

Downloads: 4

Informative Article, Mathematics, India, Volume 10 Issue 5, May 2021

Pages: 1216 - 1218

The Cyclic Group Used in 24-Hour Time Format Digital Clock

Divy Shah

Share this Article

Downloads: 108

Research Paper, Mathematics, India, Volume 3 Issue 6, June 2014

Pages: 587 - 589

Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography

Vinod Kumar, Adesh Kumari

Share this Article

Similar Articles with Keyword 'Elliptic Curves'

Downloads: 108

Research Paper, Mathematics, India, Volume 3 Issue 6, June 2014

Pages: 587 - 589

Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography

Vinod Kumar, Adesh Kumari

Share this Article

Downloads: 122

Research Paper, Mathematics, Mali, Volume 8 Issue 11, November 2019

Pages: 1659 - 1666

Optimal Ate Pairing on Elliptic Curves with Embedding Degree 21

Mahamadou Abdou TOURE, Karim SAMAKE, Sinaly TRAORE

Share this Article
Top