[Cfrg] Fwd: I-D Action: draft-irtf-cfrg-pairing-friendly-curves-07.txt

Yumi Sakemi <yumi.sakemi@lepidum.co.jp> Fri, 19 June 2020 05:07 UTC

Return-Path: <yumi.sakemi@lepidum.co.jp>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 786223A0E10 for <cfrg@ietfa.amsl.com>; Thu, 18 Jun 2020 22:07:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=lepidum-co-jp.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZVH0WKDa-KMs for <cfrg@ietfa.amsl.com>; Thu, 18 Jun 2020 22:07:30 -0700 (PDT)
Received: from mail-lj1-x231.google.com (mail-lj1-x231.google.com [IPv6:2a00:1450:4864:20::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D9503A0E07 for <cfrg@ietf.org>; Thu, 18 Jun 2020 22:07:30 -0700 (PDT)
Received: by mail-lj1-x231.google.com with SMTP id y11so9980757ljm.9 for <cfrg@ietf.org>; Thu, 18 Jun 2020 22:07:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lepidum-co-jp.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=z2LbUD3zj2sRAFxBMVl4JD+PXQe30bEZZjb74Qy53I0=; b=ae7yVdEeJkPlK6GYl9/Ju/dC5cHVsNPu/W50rLGZjS7z7hGUHQSOL0m4NkoFeTepKJ 73yqsSN850JN0qqNBqIWmz0EiSBrI7m2BnRuVhHanm4VvNj/Mw6wRfgksU2CvkLoQsar GyYRReDLZkyR3sZYDeXOxe4sNPuuZGRpxO2Wt459333/5meLnNp+mxBJQ+0FucEdxDZI 9nBuGE55LqaPJR04Tlk1OlgKcC+uqF7Ri5jMZ7VFgkbkREvFuxpBOmirfxOcpnQXuF8l PkHVfB01w1kGIq1SksRPW6rvyNcL8c/m12Z+PBDA/IOfPFzpel1q+gXE9kThmA37G5zH WNQQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=z2LbUD3zj2sRAFxBMVl4JD+PXQe30bEZZjb74Qy53I0=; b=KSV4lilzqOUEnwVgrDaPBjCPlyp0EXksifOWb0bW0UEwnfc20HSsORrA5Y/SwpcfHE 9F2gGeM2oq77mFO5kXbxnvH0WocVuOQpRla3cbx9h9Rc0twHvW19hLuemUr6J+XZ+WGm Atb8dTRvxjHWWefE1+bbXpiI2P90rau7fuWExSj9v5FYd5nSlkjepBsFuVIm2m232cA/ H6JMkv3Ax4Yu0NCizSPZ6/f7CffQwfgDEWkJPelo4V32ArNKnV83PXpyI7a80vR1omqd QvJpatTvNfIfUeQIZaIeAlbDjluvYJ6VdYdObacSMJhz+d1/laSEGBxmxYkLwZucR9Xr m3ug==
X-Gm-Message-State: AOAM531gYkNohMwmHsd3gPJ4i2Zxw1Ruq5ciNqesbAlcDLah0Z64pOQ7 llIx9MvigNjpsPMfRXJRaNvV0ybwHD6LitCV8vfot5CanoU=
X-Google-Smtp-Source: ABdhPJxaiFzhr/dhkl86inKOnloAkH23Hk+H4+uitQjDrKR/0VW08jxaa0bf6j1Y2ScG7j6gtH8QLH0wyjLoVTaJviQ=
X-Received: by 2002:a2e:800c:: with SMTP id j12mr825924ljg.218.1592543248369; Thu, 18 Jun 2020 22:07:28 -0700 (PDT)
MIME-Version: 1.0
References: <159254303747.18556.12503406694870001401@ietfa.amsl.com>
In-Reply-To: <159254303747.18556.12503406694870001401@ietfa.amsl.com>
From: Yumi Sakemi <yumi.sakemi@lepidum.co.jp>
Date: Fri, 19 Jun 2020 14:07:17 +0900
Message-ID: <CAA4D8KamuTNA+y--JXboMYcHQwVoeRU9JLc9oZ25VrF=8DmFXQ@mail.gmail.com>
To: cfrg@ietf.org
Cc: Tetsutaro Kobayashi <tetsutaro.kobayashi.dr@hco.ntt.co.jp>, SAITO Tsunekazu <tsunekazu.saito.hg@hco.ntt.co.jp>, "Riad S. Wahby" <rsw@cs.stanford.edu>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/oKzqFIFLjN7O0kujgkXHuRlBkk4>
Subject: [Cfrg] Fwd: I-D Action: draft-irtf-cfrg-pairing-friendly-curves-07.txt
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Jun 2020 05:07:33 -0000

Dear CFRG members

We submitted the version 07 of the draft "Pairing-Friendly Curves".

In the latest draft, comments from Sean Bowe were reflected.
We would like to appreciate Sean!

In detail, we added the description of Cheon's algorithm to the
Security Considerations
according to his comments.

Best regards,
Yumi

---------- Forwarded message ---------
From: <internet-drafts@ietf.org>
Date: 2020年6月19日(金) 14:04
Subject: [Cfrg] I-D Action: draft-irtf-cfrg-pairing-friendly-curves-07.txt
To: <i-d-announce@ietf.org>
Cc: <cfrg@ietf.org>



A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Crypto Forum RG of the IRTF.

        Title           : Pairing-Friendly Curves
        Authors         : Yumi Sakemi
                          Tetsutaro Kobayashi
                          Tsunekazu Saito
                          Riad S. Wahby
        Filename        : draft-irtf-cfrg-pairing-friendly-curves-07.txt
        Pages           : 53
        Date            : 2020-06-18

Abstract:
   Pairing-based cryptography, a subfield of elliptic curve
   cryptography, has received attention due to its flexible and
   practical functionality.  Pairings are special maps defined using
   elliptic curves and it can be applied to construct several
   cryptographic protocols such as identity-based encryption, attribute-
   based encryption, and so on.  At CRYPTO 2016, Kim and Barbulescu
   proposed an efficient number field sieve algorithm named exTNFS for
   the discrete logarithm problem in a finite field.  Several types of
   pairing-friendly curves such as Barreto-Naehrig curves are affected
   by the attack.  In particular, a Barreto-Naehrig curve with a 254-bit
   characteristic was adopted by a lot of cryptographic libraries as a
   parameter of 128-bit security, however, it ensures no more than the
   100-bit security level due to the effect of the attack.  In this
   memo, we list the security levels of certain pairing-friendly curves,
   and motivate our choices of curves.  First, we summarize the adoption
   status of pairing-friendly curves in standards, libraries and
   applications, and classify them in the 128-bit, 192-bit, and 256-bit
   security levels.  Then, from the viewpoints of "security" and "widely
   used", we select the recommended pairing-friendly curves considering
   exTNFS.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-irtf-cfrg-pairing-friendly-curves/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-irtf-cfrg-pairing-friendly-curves-07
https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-pairing-friendly-curves-07

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-irtf-cfrg-pairing-friendly-curves-07


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


_______________________________________________
Cfrg mailing list
Cfrg@irtf.org
https://www.irtf.org/mailman/listinfo/cfrg


-- 
Yumi Sakemi, Ph. D.
Lepidum Co. Ltd.

E-Mail: yumi.sakemi@lepidum.co.jp