An efficient divide-and-conquer technique for parallel computation of modular multi-exponentiation

Der Chyuan Lou*, Chin Chen Chang

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

2 Scopus citations

Abstract

A lot of research and system developments on the public key cryptosystem have been done in the last decade. In most of famous public key cryptosystems, the main task of the encryption and decryption engine is to compute the modular multi-exponentiation ∏i=1nMiEi (mod N), where all the values of Ei's are positive integers and n is equal to or greater than one. Several methods of fast exponentiation have been proposed in the past years to make the implementation of public key cryptosystems easierhowever, there are only a few parallel mechanisms for evaluating the modular multi-exponentiation. In this paper, we propose an efficient method for parallel computation of modular multi-exponentiation. On average, the time complexity of our proposed method for computing ∏i=1nMiEi(mod N) is O(kmax/2n) multiplication time units, where kmax is the maximal bit-length among all bit-lengths of Ei's.

Original languageEnglish
Pages (from-to)111-117
Number of pages7
JournalComputer Systems Science and Engineering
Volume15
Issue number2
StatePublished - 2000
Externally publishedYes

Keywords

  • Multi-exponentiation
  • Parallel algorithms
  • Parallel processing
  • Prefix computation
  • Public key cryptosystems
  • The binary method
  • Wormhole routing

Fingerprint

Dive into the research topics of 'An efficient divide-and-conquer technique for parallel computation of modular multi-exponentiation'. Together they form a unique fingerprint.

Cite this