Practical cryptography in high dimensional tori

M. Van Dijk, R. Granger, D. Page, K. Rubin, A. Silverberg, M. Stam, D. Woodruff

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

At Crypto 2004, van Dijk and Woodruff introduced a new way of using the algebraic tori Tn in cryptography, and obtained an asymptotically optimal n/φ (n) savings in bandwidth and storage for a number of cryptographic applications. However, the computational requirements of compression and decompression in their scheme were impractical, and it was left open to reduce them to a practical level. We give a new method that compresses orders of magnitude faster than the original, while also speeding up the decompression and improving on the compression factor (by a constant term). Further, we give the first efficient implementation that uses T30, compare its performance to XTR, CEILIDH, and ECC, and present new applications. Our methods achieve better compression than XTR and CEILIDH for the compression of as few as two group elements. This allows us to apply our results to ElGamal encryption with a small message domain to obtain ciphertexts that are 10% smaller than in previous schemes. © International Association for Cryptologic Research 2005.
Original languageEnglish
Title of host publicationAdvances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
PublisherSpringer Verlag
Pages234-250
DOIs
Publication statusPublished - 2005
Externally publishedYes
Event24th Annual International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology - EUROCRYPT 2005 - , Denmark
Duration: 22 May 200526 May 2005

Publication series

NameLecture Notes in Computer Science
ISSN (Print)0302-9743

Conference

Conference24th Annual International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology - EUROCRYPT 2005
Country/TerritoryDenmark
Period22/05/0526/05/05

Fingerprint

Dive into the research topics of 'Practical cryptography in high dimensional tori'. Together they form a unique fingerprint.

Cite this