
I54 = (I18)Fp3= (I9)Fp2)Fp3= ((I3)Fp3)Fp2)Fp3
= ((9m+ 2s+i)Fp3)Fp2)Fp3= ((9M3+ 2S3+I3)Fp2)Fp3
= ((63m+ 12s+i)Fp2)Fp3= (63M2+ 12S2+I2)Fp3
= (227m+i)Fp3= 227M3+I3= 1371m+ 2s+i,
Exploring the forth path
Fp−→ Fp3−→ Fp9−→ Fp27 −→ Fp54
The appropriate choices of irreducible polynomial defined
by:
Fp3=Fp[u]/(u3−β),with βa non-cube and u3= 2
Fp9=Fp3[v]/(v3−u),with va non-cube and v3= 21/3
Fp27 =Fp9[t]/(t3−v),with ta non-cube and t3= 21/9
Fp54 =Fp27 [w]/(w2−t),with wa non-square and w2= 21/27
P4(x4, y4) = ((a, 0, ..., 0),(0, ..., 0, b)) with x4, y4∈Fp54
P000 (x000 , y000 ) = ((a, 0, ..., 0),(0, ..., 0, b)) with x000 , y000 ∈Fp27
P00 (x00 , y00 ) = ((a, 0, ..., 0),(0, ..., 0, b)) with x00 , y00 ∈Fp9
P0(x0, y0) = ((a, 0,0),(0,0, b)) with x0, y0∈Fp3
P(x, y) = (a, b)with x, y ∈Fp
The cost of multiplication, squaring and inversion in in the
54th twisted field Fp54 are:
M54 = (M27)Fp2= (M9)Fp3)Fp2= ((M3)Fp3)Fp3)Fp2
= ((6m)Fp3)Fp3)Fp2= ((6M3)Fp3)Fp2= ((36m)Fp3)Fp2
= (36M3)Fp2= (216m)Fp2= 216M2= 648m,
S54 = (S27)Fp2= (S9)Fp3)Fp2= ((S3)Fp3)Fp3)Fp2
= ((5s)Fp3)Fp3)Fp2= ((5S3)Fp3)Fp2= ((25s)Fp3)Fp2
= (25S3)Fp2= (125s)Fp2= 125S2= 250m,
I54 = (I27)Fp2= (I9)Fp3)Fp2= ((I3)Fp3)Fp3)Fp2
= ((9m+ 2s+ +i)Fp3)Fp3)Fp2= ((9M3+ 2S3+I3)Fp3)Fp2
= ((63m+ 12s+i)Fp3)Fp2= (63M3+ 12S3+I3)Fp2
= (387m+ 62s+i)Fp2= 387M2+ 62S2+I2
= 1289m+i,
TABLE I
COST OF OPERATIONS IN EACH THE TOWER FIELDS
Path O Cost
1M54 648m
S54 432m
I54 1251m+62s+i
2M54 648m
S54 360m
I54 1323m+12s+i
3M54 648m
S54 300m
I54 1371m+2s+i
4M54 648m
S54 250m
I54 1289m+i
The table above give the overall cost of operations in each
the tower fields.
We found that the cost of multiplication and squaring is the
same for any path chosen, however the cost of inversion
change on the path, so we can see that the minimal cost for
inversion is 1289m+i.
In this paper, we give some methods for tower building of
extension of finite field of embedding degree 54. We show
that there are four efficients paths for constructions of these
extensions of degree 54. We show that by using a degree 2 or 3
twist we handle to perform most of the operations in F6
p,Fp9,
Fp18 ,Fp27 and Fp54 . By using this tower building technique,
we also improve the arithmetic of Fp54 , in order to get better
results of calculate the cost of their multiplication, squaring
and inversion.
[1] Victor S. Miller. Use of elliptic curves in cryptography. Crypto 1985,
LNCS 218, pp. 417-426, 1985.
[2] Neal Koblitz. Elliptic curve cryptosystems. Mathematics of Computa-
tion, Vol. 48, No. 177, pp. 203-209, 1987.
[3] R.L. Rivest, A. Shamir, and L.M. Adleman. A method for obtaining
digital signatures and publickey cryptosystems. Commun. ACM, Vol.
21, No. 2, pp. 120-126, 1978.
[4] Whelan, C., Scott, M.: The Importance of the Final Exponentiation in
Pairings When Considering Fault Attacks. In: Takagi, T., Okamoto, T.,
Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp.
225-246. Springer, Heidelberg (2007).
[5] Nadia El Mrabet, Nicolas Guillermin, and Sorina Ionica. A study
of pairing computation for curves with embedding degree 15. DBLP
volume 2009.
[6] Nadia El Mrabet and Marc Joye. GUIDE TO PAIRING-BASED CRYP-
TOGRAPHY. Chapman and Hall/CRC CRYPTOGRAPHY AND NET-
WORK SECURITY, 2018.
[7] Emmanuel Fouotsa, Nadia El Mrabet and Aminatou Pecha. Optimal Ate
Pairing on Elliptic Curves with Embedding Degree 9; 15 and 27. journal
of Groups, Complexity, Cryptology, Volume 12, issue 1 (April 17, 2020)
[8] Narcisse Bang Mbiang, Diego De Freitas Aranha, Emmanuel Fouotsa.
Computing the optimal ate pairing over elliptic curves with embedding
degrees 54 and 48 at the 256-bit security level. Int. J. Applied Cryptog-
raphy, Vol. 4, No. 1, 2020.
[9] Md. Al-Amin Khandaker, Taehwan Park, Yasuyuki Nogami, and Howon
Kim, Member, KIICE. A Comparative Study of Twist Property in KSS
Curves of Embedding Degree 16 and 18 from the Implementation
Perspective. J. lnf. Commun. Converg. Eng. 15(2): 97-103, Jun. 2017.
4. Comparison
5. Conclusion
References
PROOF
DOI: 10.37394/232020.2024.4.8
Assoujaa Ismail, Ezzouak Siham