[CFRG] Re: Pairing-Friendly Curves: Open Questions Before Draft Update

Yumi Sakemi <sakemi-yumi@gmo-connect.jp> Fri, 10 April 2026 02:27 UTC

Return-Path: <sakemi-yumi@chronusinc.jp>
X-Original-To: cfrg@mail2.ietf.org
Delivered-To: cfrg@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id F3E45D92C392 for <cfrg@mail2.ietf.org>; Thu, 9 Apr 2026 19:27:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1775788064; bh=qzM16GsZywaFr3aiQP83TAsPxJWROaza/PgFUpUaMao=; h=References:In-Reply-To:From:Date:Subject:To:Cc; b=ULY54otdXyUj4EKKM4j3U3DRtQxYtI3AB5zt8tn0j3xawq1JETtLr98Uo0PJI5eu1 GfnuJrbhasqS5NaPC3D/BRwbJS2j6LzduYD9EotgAzthEMVuhpmnEKbSlsFGth87Q3 l3LeenQVJ7BeaXTAVZmpa/4U9B2a7jp4CkWu+eX4=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.696
X-Spam-Level:
X-Spam-Status: No, score=-2.696 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=gmo-connect.jp header.b="VFtSTt4l"; dkim=pass (2048-bit key) header.d=gmo-connect.jp header.b="4bnBp1gc"
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0_cNg1YsXO0C for <cfrg@mail2.ietf.org>; Thu, 9 Apr 2026 19:27:42 -0700 (PDT)
Received: from ss11.activegate-ss.jp (ss11.activegate-ss.jp [223.27.119.25]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id DA6DFD92C38B for <cfrg@irtf.org>; Thu, 9 Apr 2026 19:27:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmo-connect.jp; s=20250719200908; t=1775788061; bh=nagt+Kb+fNm75N2llcO5VFKQTng1UMw1aqKJQjVgaAw=; h=References:In-Reply-To:From:Date:Message-ID:Subject:To:Cc; b=VFtSTt4lEPnLyQca7KKgAj93C6aEDRMpwztJ6eIg63RSWbhaXuGb7VjbXGtQllY/w XK9isxTtB7UUFRAz7eEdUhTbTDLvEbg40ib3FJX81lsR6Ci6K8uHc+iaicpqBVysuu qj712hb4NGrEMIGoQicdQ9vmARyjxG36PcRLVrAg=
Authentication-Results: ss11.activegate-ss.jp; dkim=pass header.d=gmo-connect.jp
Received: from mail.d.activegate-ss.jp (unknown [10.16.39.39]) (envelope sender: <sakemi-yumi@chronusinc.jp>) (not using TLS) by ss11.activegate-ss.jp (Active!gate) with ESMTP id KLa725144B; Fri, 10 Apr 2026 11:27:00 +0900
Received: by mail-oi1-f198.google.com with SMTP id 5614622812f47-477dfff4f0aso779578b6e.2; Thu, 09 Apr 2026 19:26:59 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1775788018; cv=none; d=google.com; s=arc-20240605; b=R1k+QfUV2XT8wJVtamp9x6Jo83VUK2t/pxhIEDoQTPUnRT3WoX0Naj+S/RvQUqStUj 9sG4FwRpX8k3SknIhR9GCadz9Xy0jRMXPakHj7d0wUh+JUQY70l4OJh2xaZANPpCaetX M+zoZ6eQLATRXPxx7PHt52oH1TxG/tYnxfZVZNUJgDg/UYn2f64Q+WAeAVIMpkYzdWz/ v5WicYEzuCVmTB/CZYK4G8Z2l6YzqrmApMIyIFb+HgZwoPzh56qzFiFBN8wVkZULA5bN +dyNoqVy9EXJ4IoPjm7jTOrjD8F+J9r+zEIw7J6DD4IqtrGUGVNe+hm954DBp6js3ZfF e/IA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:dkim-signature; bh=nagt+Kb+fNm75N2llcO5VFKQTng1UMw1aqKJQjVgaAw=; fh=NrdE9Vpwyw4r62NhEnkf9gf5x1qlg4ag/67HvcuHC7c=; b=UXZxHLVxeCopTwgzzT5+ZhlsDUeTDuS3RAZeun2JhOrN/vfzk1xqEzP9mY09HoU+qz tckf84xGVJEhM8kmzGN9p9DD5maJEf98sHXZ8B6Yplg22W2QeHAucZMU/WTgSltxskUm uWmi/kbFOA4BmVwoK1OzYZ11WIspf3QfWB7ZTPiahQSGJNpnZtJYFaVEZ09dq01ir3Uy 4c1x6o2Ot+YCrXUkEvqXKvUhBfuLePAAx20xvR4MwFyBBJUaJA9fQjCUMIJPJoYBu5PD A1NAmU1EnMoN9n2Du6R4fF0mR2bcZ9gmswl/KAzxL3oGI508Z0jGoDgK1lDIfnZJ3X60 5EpQ==; darn=gmo-connect.jp
ARC-Authentication-Results: i=1; mx.google.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmo-connect.jp; s=google; t=1775788018; x=1776392818; darn=gmo-connect.jp; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=nagt+Kb+fNm75N2llcO5VFKQTng1UMw1aqKJQjVgaAw=; b=4bnBp1gc/AljBLT0FKGAWiHtIWIuRb+2FDAZIZY0XFAdUS6S202ic8EHGosT34A1TX yCnsfkF7XJYvOZyCb2TwkVku9gDSp8W4XY8jwzhNpvlFgtyugADcLSiQZvK8asW7G1Rl bIa3/7XcK4hbIUThmMCrxyynE6gJNazHSbm7SAxPmvw+gvuVHHgGcKeq3PbStSaeGp+L JT4ayzDhd3tfnrSVU6nGl/Q6JtuqW/l0TbzWwiXPbpNQnxXa7RKdi1s/vjarURnl23yN 9PNLWoJ8yKj6joX4d6RxwFN+kIgEQcVcnBiQYZxdUyKhL6DecLHR8iAg/d64VfTjmicq Tbmg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1775788018; x=1776392818; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=nagt+Kb+fNm75N2llcO5VFKQTng1UMw1aqKJQjVgaAw=; b=ee5bxJF0zKxaO9uLJvkjv2DQDOqv39IIxMgvzUGiLjlPxDB2HBIPC2svGkiD1+ZeEL TY33eMLwHE7fOz4E/KUsm9gOjyEOMyh+t/I4p72zbFk5lX9NvUrRJesoInvW6xrwrVSr bQoWvNGtXUQ9dfaUehKGqu4pxzYaRBsxdDepel/OtVl+ncOc037b1j8K5Dfq2tD8uiEx kg4lBzv/cUWvqjZYUC2ODjAx3SzXV+A2qnuCo6d+GnzBa4g28N9leXd3FZMdBeJggf6n qPSu/JPAhC5oTuFToK7ro1m2A5WAT8W1Y8Dv9+yQjLHhkV2Sf10gg4D1ygoTYXXTsEKC l4Ig==
X-Forwarded-Encrypted: i=1; AJvYcCU7v6Hgg40taCNdiBMV0KzN8rbovS0e2RtH4lsH8AKOPqpN1kjOD20Zs6IfnX6CynRsDFVBrg==@gmo-connect.jp
X-Gm-Message-State: AOJu0YwO5OuQoimIGQHTQCG2yGg8ISscAJ/UYaDixZd4nlI77arfO5a4 Td3ael37dyS+03WIGd4K7Z5g9F3hxFsD3lDu4CVpTCio+PVebPwWsQo1M0krIxBR6VzGcATFGf/ SdgfgZf0Zp7gd0ZDLdRAAYYvvidOO/LcXik8PTSKkmOvJBX9FytZJ0aUO6+iVqSgOw45wslkidD LN/BHj/RjjDUBGuY51BSGeLH27Jsw5rAfmpMnV8rXOFb/W40blxf1R4p3SyuZQ
X-Gm-Gg: AeBDiev7r7uu+rM82SnCUBXKI3/wEf2VjHiYK+BXNG18tHiBMrc6sFyPZWpDb+wYU6c t8cjH0NmzBtcZ01j1geYwucG0dbj6zy4MH6PlUsYv4cd5mHQacfVznZggxvBXnTuFszygbehFHP 8kVS1GP6Ma5h0ZmpNsv5UEX1tSsdHYcr2fwRsLf2PCS3zv4deW9pi+L1bgpU0qUrlmXhbRVuzjJ Kn6j+frBkhN1ta2WgLclQ==
X-Received: by 2002:a05:6820:1ca0:b0:67e:160c:36a8 with SMTP id 006d021491bc7-68be5c58d71mr727102eaf.1.1775788018402; Thu, 09 Apr 2026 19:26:58 -0700 (PDT)
X-Received: by 2002:a05:6820:1ca0:b0:67e:160c:36a8 with SMTP id 006d021491bc7-68be5c58d71mr727091eaf.1.1775788017968; Thu, 09 Apr 2026 19:26:57 -0700 (PDT)
MIME-Version: 1.0
References: <CAK2GZbF3RdEdi9qhF+XQ_igUtmKtEsCxpt7mZT6Enumq0RkONA@mail.gmail.com> <CANZ5RKVuvUAHJCkLNWfvy7LsrHXOcQ-3KbKQoWvUtzBbty67gQ@mail.gmail.com> <CANZ5RKVEWcq-ugwOVAOv3OzqUNbSg4EtGHgNVP_6Gi4RAu8G_w@mail.gmail.com> <CAK2GZbHuiiWAg=Zo1xLdw6dOnVpo=G_1fvRUrKQv74cZWtgrHw@mail.gmail.com>
In-Reply-To: <CAK2GZbHuiiWAg=Zo1xLdw6dOnVpo=G_1fvRUrKQv74cZWtgrHw@mail.gmail.com>
From: Yumi Sakemi <sakemi-yumi@gmo-connect.jp>
Date: Fri, 10 Apr 2026 11:26:47 +0900
X-Gm-Features: AQROBzBBxzFqkB4ItlJN73XtmKMceGZN2UBJiq5UJV-aA2IDIxoXwsMFCacUKIE
Message-ID: <CANZ5RKUkucQd68JymmYjKdabuMy08o4-3h=NOGa_nrr5W8sb7w@mail.gmail.com>
To: "Diego F. Aranha" <dfaranha@gmail.com>
Content-Type: multipart/alternative; boundary="00000000000001f71c064f11de29"
Message-ID-Hash: 6ZUBACJTKRLDOHQTG3HIGOTHYHV7GNPA
X-Message-ID-Hash: 6ZUBACJTKRLDOHQTG3HIGOTHYHV7GNPA
X-MailFrom: sakemi-yumi@chronusinc.jp
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-cfrg.irtf.org-0; header-match-cfrg.irtf.org-1; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: cfrg@irtf.org, 菅野哲 <kanno@gmo-connect.jp>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [CFRG] Re: Pairing-Friendly Curves: Open Questions Before Draft Update
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/ByzfyEPyO7WD-HIOtfrbHrQHFGY>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Owner: <mailto:cfrg-owner@irtf.org>
List-Post: <mailto:cfrg@irtf.org>
List-Subscribe: <mailto:cfrg-join@irtf.org>
List-Unsubscribe: <mailto:cfrg-leave@irtf.org>

Hi Diego,

Thank you for the detailed explanation on the word-boundary rationale — the
argument that field sizes just above a word boundary (like BN462 and
BLS48_581) decrease performance without a practical security gain is clear
and well-supported. Guillevic's analysis is a helpful reference.

Your explanation also addressed my question about why BLS24-509 is
preferred over BLS24-479: the 509-bit field is the minimum for ~192-bit
security under current analysis (Aranha–Guillevic), while still fitting in
8 × 64-bit words. Thank you for clarifying this.

To move the discussion forward, I'd like to follow up on the remaining item
from my earlier email. The draft's selection policy (Section 4) asks that
recommended curves be (1) peer-reviewed, (2) widely used in libraries, and
(3) prioritize security over efficiency. Your response covered the
security/efficiency rationale well. For the "widely used" criterion, could
you share:

BLS24-509: Are there additional library implementations or deployed systems
beyond RELIC and the Rust implementation referenced in PR #70?
BN446 and BLS48-575: Peer-reviewed references and library implementations
for these curves, so the group can evaluate them under the same criteria.
I recognize that adoption for newer curve parameterizations may still be
limited compared to the established curves — that's understandable. Having
the concrete data would help the group assess where each proposal stands
relative to the selection policy, especially since the current parameter
set has already passed expert crypto panel review. Any changes to the
recommended curves would need to be carefully evaluated by the community.

We are also preparing GitHub issues to organize the discussion items from
the December 2025 Open Questions thread (serialization, identity point
handling, etc.) and will notify the list once those are filed. The curve
selection discussion is best continued here on the ML where it has broader
visibility.

Best regards,
Yumi

2026年3月20日(金) 5:08 Diego F. Aranha <dfaranha@gmail.com>:

> Dear Yumi,
>
> The rationale for the suggested curves is essentially the same: Ideal
> parameters have the field size close to a word boundary, so we have the
> best cost-benefit between performance and security.
>
> Because most platforms of interest for pairing-based cryptography are 32-
> and 64-bit CPUs, it is ideal that field sizes are slightly under multiples
> of 32 and 64, so there is extra space to handle carries and optimize
> extension field arithmetic in G2 and GT. Of course this assumes that lower
> bounds on the group order are also satisfied for dlog-security.
>
> In short:
> - The base field of BLS24-479 takes 15 32-bit words and 8 64-bit words.
> BLS24-509 takes 16 32-bit words and the same 8 64-bit words. Considering
> that the analysis in Aranha-Guillevic establishes 509-bit fields as the
> minimum for ~192-bit security under current attacks, BLS24-509 has a better
> security/performance trade-off between the two.
> - Curves BN462 and BLS48_581 have field sizes just a few bits above a word
> boundary (14 and 5 respectively), decreasing performance at no practical
> gain in security. Guillevic supports the same argument with concrete
> numbers at
> https://people.irisa.fr/Aurore.Guillevic/Pairing_friendly_curves.html#bls12-381-bls12-461-or-bls12-446
>
> I will follow-up later with a comparison between levels of
> adoption/support for these parameter choices.
> --
> Diego F. Aranha
> Associate Professor at Computer Science - Aarhus University, Denmark
> https://dfaranha.github.io/
>
> Åbogade 34, Building 5335 (Office 291 at Nygaard)
> 8200 Aarhus N, Denmark
>
>
>
> <https://sites.google.com/site/dfaranha>
>
>
> On Tue, Mar 17, 2026 at 7:11 AM Yumi Sakemi <sakemi-yumi@gmo-connect.jp>
> wrote:
>
>> Hi Diego,
>>
>>  Thank you for your PRs (#70 and #71) —
>> I appreciate your contributions to the draft.
>>
>>  I wanted to let you know that I have just synced the GitHub repository
>> with the latest version on datatracker (v12).
>> The main change is a migration from RFC XML to kramdown-rfc Markdown
>> format.
>>  As a result, your PRs may have conflicts with the updated master branch.
>>
>> Could you please rebase them against the current master when you have a
>> chance?
>>
>>  Regarding the BLS24-509 proposal in PR #70,
>> I plan to start a discussion on the CFRG mailing list to evaluate it
>> against the selection policy defined in Section 4 of the I-D.
>> I'll send that email separately.
>>
>> Best regards,
>> Yumi
>>
>>
>> 2026年3月17日(火) 9:44 Yumi Sakemi <sakemi-yumi@gmo-connect.jp>:
>>
>>> Dear all,
>>>
>>> Thank you Diego for the proposal and for posting to the list.
>>>
>>> We are currently updating the GitHub repository to sync with the latest
>>> datatracker version (draft-irtf-cfrg-pairing-friendly-curves-12). Once that
>>> is done, PR #70 will show a clean diff for easier review.
>>>
>>> To help the group evaluate this proposal, I'd like to walk through the
>>> draft's selection policy (Section 4). The policy states that recommended
>>> curves should (1) have security demonstrated in peer-reviewed papers, (2)
>>> be widely used in cryptographic libraries, and (3) prioritize security over
>>> efficiency.
>>>
>>> For BLS24-509 at the 192-bit security level:
>>>
>>>    - *Peer review:* The security analysis has been published in CIC
>>>    2024 (ePrint 2024/1223), which is a peer-reviewed IACR venue. This appears
>>>    to satisfy criterion (1).
>>>    - *Library support:* PR #70 references two implementations — RELIC
>>>    and an independent Rust implementation (efficient-rust-pairings by Faraoun
>>>    Kamel Mohamed). For reference, the current draft cites 4–5 library
>>>    implementations for BN462 and BLS48_581. Are there additional libraries or
>>>    deployed systems using BLS24-509 beyond these two? It would help the group
>>>    to understand how the level of adoption compares with the currently
>>>    recommended curves.
>>>
>>> Additionally, I note that MIRACL Core includes BLS24-479 as an
>>> experimental 192-bit BLS24 curve, which is a different parameterization
>>> from BLS24-509. Diego, could you briefly explain why BLS24-509 is the
>>> preferred candidate over other BLS24 parameterizations at this security
>>> level?
>>>
>>> Regarding the suggestion to replace BN462 with BN446 and BLS48_581 with
>>> BLS48-575: these changes are not yet included in PR #70. If we want to
>>> discuss these as well, it would be helpful to have the same information —
>>> peer-reviewed references and library implementations — so the group can
>>> evaluate them under the same selection criteria.
>>>
>>> Looking forward to the discussion.
>>>
>>> Best regards,
>>>
>>> Yumi
>>>
>>> 2026年3月17日(火) 6:18 Diego F. Aranha <dfaranha@gmail.com>:
>>>
>>>> Dear all,
>>>>
>>>> Thank you for the work so far in this draft!
>>>>
>>>> We propose to include a BLS24 curve at the 192-bit security level, now
>>>> that candidates are clear.
>>>> This PR includes parameters and test vectors, and points to security
>>>> analysis:
>>>> https://github.com/cfrg/draft-irtf-cfrg-pairing-friendly-curves/pull/70
>>>>
>>>> I believe keeping a BN curve is useful for backwards compatibility and
>>>> to benefit from acceleration to prime-order curves that may be already
>>>> available in selected hardware.
>>>> However, I would claim that BN446 and BLS48-575 are respectively better
>>>> options than the BN462 and BLS48_581 curves included in the standard.
>>>> They offer very similar bit-security while requiring one less word to
>>>> represent field elements, giving a non-trivial speedup in practice.
>>>>
>>>> Please let us know if there are any objections to these changes.
>>>>
>>>> Sincerely,
>>>> --
>>>> Diego F. Aranha
>>>> Associate Professor at Computer Science - Aarhus University, Denmark
>>>> https://dfaranha.github.io/
>>>>
>>>> Åbogade 34, Building 5335 (Office 291 at Nygaard)
>>>> 8200 Aarhus N, Denmark
>>>>
>>>>
>>>>
>>>> <https://sites.google.com/site/dfaranha>
>>>> _______________________________________________
>>>> CFRG mailing list -- cfrg@irtf.org
>>>> To unsubscribe send an email to cfrg-leave@irtf.org
>>>>
>>>