<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article         dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>ijiss</journal-id>
            <journal-title-group>
                                                                                    <journal-title>International Journal of Information Security Science</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2147-0030</issn>
                                                                                            <publisher>
                    <publisher-name>Şeref SAĞIROĞLU</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id/>
                                                                                                                                                                                            <title-group>
                                                                                                                        <article-title>The Final Exponentiation in Pairing-Based Cryptography</article-title>
                                                                                                                                        </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                <name>
                                    <surname>Kirlar</surname>
                                    <given-names>Baris</given-names>
                                </name>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20120410">
                    <day>04</day>
                    <month>10</month>
                    <year>2012</year>
                </pub-date>
                                        <volume>1</volume>
                                        <issue>1</issue>
                                        <fpage>1</fpage>
                                        <lpage>12</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20160130">
                        <day>01</day>
                        <month>30</month>
                        <year>2016</year>
                    </date>
                                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2012, International Journal of Information Security Science</copyright-statement>
                    <copyright-year>2012</copyright-year>
                    <copyright-holder>International Journal of Information Security Science</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>In recent years, there has been many work related to the pairing-based cryptosystems. These systems rely on bilinear nondegenerate maps called pairings, such as Tate pairing defined over elliptic curves. In these systems, there is always a powering of an element to compute. To do this, one can utilize compressed form of the element in the cyclotomic subgroup of the finite fields $\mathbb F^{*}_{q^{k}}$. Compressed form of field elements also gives rise to define new public key cryptosystems that play an important role in ensuring information security. In this paper, we review how to compute the final powering efficiently. Then we illustrate some algorithms to compute the power of an element in $\mathbb F^{*}_{q^{k}}$ with $k=2,3,4,6,10$ and propose new formulae for $k=14$. We also show how to define short signature scheme using compressed pairings.</p></abstract>
                                                                                    
            
                                                            <kwd-group>
                                                    <kwd>—exponentiation</kwd>
                                                    <kwd>   compression</kwd>
                                                    <kwd>   pairing-based cryptography</kwd>
                                            </kwd-group>
                                                        
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">P. S. L. M. Barreto, S. D. Galbraith, C. Eigeartaigh, and M. Scott. “Efficient pairing computation on supersingular abelian varieties”. Designs, Codes and Cryptography, 42(3), pages 239- 271, 2007.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">P. S. L. M. Barreto, H. Y. Kim, B. Lynn, and M. Scott. “Efficient algorithms for pairing-based cryptosystems”. Advances in Cryptology - Crypto 2002, LNCS 2442, Springer-Verlag, pages 354-368, 2002.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">P. S. L. M. Barreto, B. Lynn, and M. Scott. “On the selection of pairing-friendly groups”. Selected Areas in Cryptography - SAC 2003, LNCS 3006, pages 17-25, 2004.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">I.F. Blake, G. Seroussi, and N.P. Smart. “Advances in Elliptic Curve Cryptography”. London Math. Soc. Lec. Note S., 317, Cambridge, 2005.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">D. Boneh, and M. Franklin. “Identity-based encryption from the Weil pairing”. SIAM Journal of Computing, 32(3), pages 586- 615, 2003.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">D. Boneh, B. Lynn, and H. Shacham. “Short signatures from the Weil pairing”. Advances in Cryptology - Asiacrypt 2001, LNCS 2248, Springer-Verlag, pages 514-532, 2002.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">W. Bosma, J. Hutton, and E. Verheul. “Looking beyond XTR”. Advances in Cryptology - Asiacrypt 2002, LNCS 2501, Springer- Verlag, pages 46-63, 2002.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">A. Brouwer, R. Pellikaan, and E. Verheul. “Doing more with fewer bits”. Advances in Cryptology - Asiacrypt 1999, LNCS 1716, pages 321-332, 1999.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">C. M. Fiduccia. “An efficient formula for linear recurrences”. SIAM J. Comput., 14, pages 106-112, 1985.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">S. Galbraith, K. Harrison, and D. Soldera. “Implementing the Tate pairing”. Algorithmic Number Theory Symposium - ANTS V, LNCS 2369, pages 324-337, 2002.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">K. Giuliani, and G. Gong. “Efficient Key Agreement and Sig- nature Schemes Using Compact Representations in GF (p)”. IEEE International Symposium on Information Theory - ISIT 2004, pages 13-13, 2004.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">K. Giuliani, and G. Gong. “A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences”. Sequences and Their Applications - SETA 2006, LNCS 4086, pages 237-247, 2006.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">G. Gong, and L. Harn. “Public-key cryptosystems based on cubic finite field extensions”. IEEE Transactions on Information Theory 45, no. 7, pages 2601-2605, 1999.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">G. Gong, L. Harn, and H. Wu. “The GH Public-key Cryptosys- tems”. Selected Areas in Cryptography - SAC 2001, LNCS 2259, pages 284-300, 2001.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">G. Gong, A. Hassan, H. Wu, and A. Youssef. “An Efficient Algorithm for Exponentiation in DH Key Exchange and DSA in Cubic Extension Fields”. Research report at Faculty of Math., University of Waterloo, 2002.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">F. Hess, N. Smart, and F. Vercauteren. “The eta pairing revis- ited”. IEEE Transactions on Information Theory, 52(10), pages 4595-4602, 2006.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">K. Hoffman, and R. Kunze. “Linear Algebra”. Prentice Hall, New Jersey, USA, 2nd edition, 1971.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">K. Karabina. “Factor-4 and 6 compression of cyclotomic sub- 2groups of F*4m 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">B. B. Kırlar. “Elliptic Curve Pairing-Based Cryptography”, PhD Thesis, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">E. Lee, H. Lee, and C. Park. “Efficient and generalized pairing computation on abelian varieties”. Cryptology ePrint Archive.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">A. Lenstra, and E. Verheul. “The XTR public key system”. Advances in Cryptology - Crypto 2000, LNCS 1880, pages 1-19, 2000.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">R. Lidl, and H. Niederreiter. “Finite Fields”. Cambridge Uni- versity Press, UK, 2nd edition, 1997.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">B. Lynn. “On The Implementation of Pairing-Based Cryptosys- tems”, PhD Thesis, 2007.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">V. Miller. “The Weil pairing, and its efficient calculation”. Journal of Cryptology, 17(4), pages 235-262, 2004.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">A. Miyaji, M. Nakabayashi, and S. Takano. “New explicit conditions of elliptic curve traces for FR-reduction”. IEICE Trans. Fund. Electron. Comm. Comput. Sci., E84-A(5), pages 1234-1243, 2001.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">L. Quoos, and S.-F. Mjİlsnes. “Public Key Systems Based on Finite Field Extensions of Degree Five”. Presented at Fq7 conference, 2003.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">M. Shirase, D. Han, Y. Hibin, H. Kim, and T. Takagi. “A more compact representation of XTR cryptosystem”. IEICE Trans. Fund. Electron. Comm. Comput. Sci., E91-A(10), pages 2843- 2850, 2008.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">M. Scott, and P. Barreto. “Compressed pairings”. Advances in Cryptology - Crypto 2004, LNCS 3152, Springer-Verlag, pages 140-156, 2004.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">P. Smith, and M. Lennon. “LUC: A new public key system”. Proceedings of the 9th IFIP Symp. - IFIP/Sec 1993, pages 103- 117, 1993.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">P. Smith, and C. Skinner. “A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms”. Advances in Cryptology - Asiacrypt 1994, LNCS 917, pages 357-364, 1994.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">S.-M. Yen, and C.-S. Laih. “Fast algorithms for LUC digital signature computation”. IEE Proc.Comput. Tech. 142(2), pages 165-169, 1995.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">C. Zhao, F. Zhang, and J. Huang. “A note on the ate pairing”. Cryptology ePrint Archive.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
