Abstract
This paper extends results concerning efficient exponentiation in groups where inversion is easy (e.g. in elliptic curve cryptography). It examines the right-to-left and left-to-right signed fractional window (RL-SFW and LR-SFW) techniques and shows that both RL-SFW and LR-SFW representations have minimal weight among all signed-digit representations with digit set {±1, ±3, ..., ±m, 0}.(Fractional windows generalize earlier sliding-window techniques, providing more flexibility for exponentiation algorithms in order to make best use of the memory that is available for storing intermediate results.) Then it considers the length of representations: LR-SFW representations are an improvement over RL-SFW representations in that they tend to be shorter; further length improvements are possible by post-processing the representations.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Avanzi, R.M.: A note on the sliding window integer recoding and its left-to-right analogue. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 130–143. Springer, Heidelberg (2004)
Blake, I.F., Seroussi, G., Smart, N.P.: Elliptic Curves in Cryptography. London Mathematical Society Lecture Note Series, vol. 265. Cambridge University Press, Cambridge (1999)
Cohen, H., Ono, T., Miyaji, A.: Efficient elliptic curve exponentiation using mixed coordinates. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 51–65. Springer, Heidelberg (1998)
Gordon, D.M.: A survey of fast exponentiation methods. Journal of Algorithms 27, 129–146 (1998)
Goriac, I., Iftene, S.: Personal communication (2003)
Grabner, P.J., Heuberger, C., Prodinger, H., Thuswaldner, J.M.: Analysis of linear combination algorithms in cryptography. Preprint (2003), Available from http://www.opt.math.tu-graz.ac.at/~cheub/publications/
Heuberger, C., Katti, R., Prodinger, H., Ruan, X.: The alternating greedy expansion and applications to left-to-right algorithms in cryptography. Preprint (2004), Available from http://www.opt.math.tu-graz.ac.at/~cheub/publications/
Joye, M., Yen, S.-M.: Optimal left-to-right binary signed-digit recoding. IEEE Transactions on Computers 49, 740–748 (2000)
Khabbazian, M., Gulliver, T.A.: A new minimal average weight representation for left-to-right point multiplication methods. Cryptology ePrint Archive Report 2004/266 (2004), Available from http://eprint.iacr.org/
Knuth, D.E.: The Art of Computer Programming. Seminumerical Algorithms, vol. 2. Addison-Wesley, Reading (1969)
Knuth, D.E.: The Art of Computer Programming, 3rd edn. Seminumerical Algorithms, vol. 2. Addison-Wesley, Reading (1998)
Miyaji, A., Ono, T., Cohen, H.: Efficient elliptic curve exponentiation. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 282–290. Springer, Heidelberg (1997)
Möller, B.: Algorithms for multi-exponentiation. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 165–180. Springer, Heidelberg (2001)
Möller, B.: Improved techniques for fast exponentiation. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 298–312. Springer, Heidelberg (2003)
Muir, J.A., Stinson, D.R.: Minimality and other properties of the width-w nonadjacent form. Mathematics of Computation. preprint (to appear), available from http://www.cacr.math.uwaterloo.ca/tech_reports.html
Muir, J.A., Stinson, D.R.: New minimal weight representations for left-to-right window methods. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 366–383. Springer, Heidelberg (2005), preprint available from http://www.cacr.math.uwaterloo.ca/tech_reports.html
Okeya, K., Schmidt-Samoa, K., Spahn, C., Takagi, T.: Signed binary representations revisited. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 123–139. Springer, Heidelberg (2004)
Reitwiesner, G.W.: Binary arithmetic. Advances in Computers 1, 231–308 (1960)
Schmidt-Samoa, K., Semay, O., Takagi, T.: Analysis of some efficient window methods and their application to elliptic curve cryptosystems. Technical Report TI-3/04 (2004), Available from http://www.informatik.tu-darmstadt.de/ftp/pub/TI/TR/
Schroeppel, R., Orman, H., O’Malley, S., Spatscheck, O.: Fast key exchange with elliptic curve systems. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 43–56. Springer, Heidelberg (1995)
Solinas, J.A.: An improved algorithm for arithmetic on a family of elliptic curves. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 357–371. Springer, Heidelberg (1997)
Solinas, J.A.: Efficient arithmetic on Koblitz curves. Designs, Codes and Cryptography 19, 195–249 (2000)
Yao, A.C.-C.: On the evaluation of powers. SIAM Journal on Computing 5, 100–103 (1976)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Möller, B. (2005). Fractional Windows Revisited:Improved Signed-Digit Representations for Efficient Exponentiation. In: Park, Cs., Chee, S. (eds) Information Security and Cryptology – ICISC 2004. ICISC 2004. Lecture Notes in Computer Science, vol 3506. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11496618_11
Download citation
DOI: https://doi.org/10.1007/11496618_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26226-8
Online ISBN: 978-3-540-32083-8
eBook Packages: Computer ScienceComputer Science (R0)