[Resource Topic] 2022/277: Security Analysis of Elliptic Curves over Sextic Extension of Small Prime Fields

Welcome to the resource topic for 2022/277

Title:
Security Analysis of Elliptic Curves over Sextic Extension of Small Prime Fields

Authors: Robin Salen, Vijaykumar Singh, Vladimir Soukharev

Abstract:

In this report we investigate how to generate secure elliptic curves over sextic extension of prime fields of size roughly 64 bits to achieve 128-bit security. In particular, we present one of such curves over a 64-bit prime field, which we named Cheetah, and provide its security parameter. This curve is particularly well-suited for zero-knowledge applications such as FRI-based STARK proving systems, as its base prime field has the property of having a large two-adicity, necessary for FFT-related operations and at the same time it is used for elliptic curve-based signatures. We also provide a prototype implementation of this curve in Rust, featuring constant-time arithmetic and no use of the Rust standard library for WebAssembly support.

ePrint: https://eprint.iacr.org/2022/277

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .