Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Saved research
Cart
  1. Home
  2. Advances in Cryptology - CRYPTO 2003
  3. Conference paper

Torus-Based Cryptography

  • Conference paper
  • pp 349–365
  • Cite this conference paper
Advances in Cryptology - CRYPTO 2003 (CRYPTO 2003)
Torus-Based Cryptography
  • Karl Rubin5 &
  • Alice Silverberg6 

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2729))

Included in the following conference series:

  • Annual International Cryptology Conference
  • 4483 Accesses

  • 63 Citations

  • 12 Altmetric

Abstract

We introduce the concept of torus-based cryptography, give a new public key system called CEILIDH, and compare it to other discrete log based systems including Lucas-based systems and XTR. Like those systems, we obtain small key sizes. While Lucas-based systems and XTR are essentially restricted to exponentiation, we are able to perform multiplication as well. We also disprove the open conjectures from [2], and give a new algebro-geometric interpretation of the approach in that paper and of LUC and XTR.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

On the comparison of methods for asymmetric execution of cryptographic primitives and protocols in the context of using small parameters and short keys

Article 31 October 2021

Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions

Chapter © 2020

Removable weak keys for discrete logarithm-based cryptography

Article 24 November 2020

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Cryptology
  • Discrete Mathematics in Computer Science
  • DNA computing and cryptography
  • Mathematics of Computing
  • Quantum Communications and Cryptography
  • TOR signalling
  • Multivariate Cryptography and Algorithmic Approaches

References

  1. Bleichenbacher, D., Bosma, W., Lenstra, A.K.: Some remarks on Lucas-based cryptosystems. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 386–396. Springer, Heidelberg (1995)

    Google Scholar 

  2. Bosma, W., Hutton, J., Verheul, E.R.: Looking beyond XTR. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 46–63. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  3. Brouwer, A.E., Pellikaan, R., Verheul, E.R.: Doing more with fewer bits. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 321–332. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  4. de Bruijn, N.G.: On the factorization of cyclic groups. Nederl. Akad. Wetensch. Proc. Ser. A 56 (= Indagationes Math. 15), 370–377 (1953)

    Google Scholar 

  5. Gong, G., Harn, L.: Public-key cryptosystems based on cubic finite field extensions. IEEE Trans. Inform. Theory 45, 2601–2605 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  6. Klyachko, A.A.: On the rationality of tori with cyclic splitting field. In: Arithmetic and geometry of varieties, pp. 73–78. Kuybyshev Univ. Press, Kuybyshev (1988) (Russian)

    Google Scholar 

  7. Lenstra, A.K., Verheul, E.R.: The XTR public key system. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 1–19. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  8. Lenstra, A.K., Verheul, E.R.: An overview of the XTR public key system. In: Publickey cryptography and computational number theory (Warsaw, 2000), pp. 151–180. de Gruyter, Berlin (2001)

    Google Scholar 

  9. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  10. Müller, W.B., Nöbauer, W.: Some remarks on public-key cryptosystems. Studia Sci. Math. Hungar 16, 71–76 (1981)

    MATH  MathSciNet  Google Scholar 

  11. Ono, T.: Arithmetic of algebraic tori. Ann. of Math. 74, 101–139 (1961)

    Article  MathSciNet  Google Scholar 

  12. Rubin, K., Silverberg, A.: Supersingular abelian varieties in cryptology. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 336–353. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  13. Rubin, K., Silverberg, A.: Algebraic tori in cryptography. In: To appear in High Primes and Misdemeanours: lectures in honour of the 60th birthday of Hugh Cowie Williams. Fields Institute Communications Series. American Mathematical Society, Providence

    Google Scholar 

  14. Schoenberg, I.J.: A note on the cyclotomic polynomial. Mathematika 11, 131–136 (1964)

    Article  MATH  MathSciNet  Google Scholar 

  15. Smith, P.J., Lennon, M.J.J.: LUC: A New Public Key System. In: Proceedings of the IFIP TC11 Ninth International Conference on Information Security IFIP/Sec 1993, pp. 103–117. North-Holland, Amsterdam (1993)

    Google Scholar 

  16. Smith, P., Skinner, C.: A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 357–364. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  17. Voskresenskii, V.E.: Algebraic groups and their birational invariants, Translations of Mathematical Monographs, vol. 179. American Mathematical Society, Providence (1998)

    Google Scholar 

  18. Voskresenskii, V.E.: Stably rational algebraic tori, Les XXèmes Journées Arithmétiques (Limoges, 1997). J. Théor. Nombres Bordeaux 11, 263–268 (1999)

    MATH  MathSciNet  Google Scholar 

  19. Weil, A.: Adeles and algebraic groups. Progress in Math. 23, Birkhäuser, Boston (1982)

    Google Scholar 

  20. Williams, H.C.: A p + 1 method of factoring. Math. Comp. 39, 225–234 (1982)

    Article  MATH  MathSciNet  Google Scholar 

  21. Williams, H.C.: Some public-key crypto-functions as intractable as factorization. Cryptologia 9, 223–237 (1985)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Mathematics, Stanford University, Stanford, CA, USA

    Karl Rubin

  2. Department of Mathematics, Ohio State University, Columbus, OH, USA

    Alice Silverberg

Authors
  1. Karl Rubin
    View author publications

    Search author on:PubMed Google Scholar

  2. Alice Silverberg
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Computer Science Dept., Stanford University,  

    Dan Boneh

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rubin, K., Silverberg, A. (2003). Torus-Based Cryptography. In: Boneh, D. (eds) Advances in Cryptology - CRYPTO 2003. CRYPTO 2003. Lecture Notes in Computer Science, vol 2729. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45146-4_21

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-540-45146-4_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40674-7

  • Online ISBN: 978-3-540-45146-4

  • eBook Packages: Springer Book Archive

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

104.36.149.241

Not affiliated

Springer Nature

© 2026 Springer Nature

Morty Proxy This is a proxified and sanitized view of the page, visit original site.