Efficient implementation of tate pairing on a mobile phone using java

Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)


Pairing-based cryptosystems (PBC) have been attracted by researchers in cryptography. Some implementations show that PBC are relatively slower than the standard public key cryptosystems. We present an efficient implementation for computing Tate pairing on a mobile phone using Java. We implemented the ηT pairing (a recent efficient variation of Duursma-Lee algorithm) over some finite fields of characteristic 3 with extension degree m = {97, 167, 193, 239}. Our optimized implementation for m = 97 achieved about 0.5 seconds for computing the T]T pairing over FOMA SH901iS, NTT DoCoMo. Then our implementation of the ηT pairing is compared in the same platform with other Java program of the standard cryptosystems, i.e., RSA cryptosystem and elliptic curve cryptosystem (ECC). The computation speed of the X\T pairing is comparable to that of RSA or ECC on the same mobile device.

Original languageEnglish
Title of host publicationComputational Intelligence and Security - International Conference, CIS 2006, Revised Selected Papers
PublisherSpringer Verlag
Number of pages10
ISBN (Print)9783540743767
Publication statusPublished - 2007
Externally publishedYes
EventInternational Conference on Computational Intelligence and Security, CIS 2006 - Guangzhou, China
Duration: Nov 3 2006Nov 6 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4456 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


OtherInternational Conference on Computational Intelligence and Security, CIS 2006

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'Efficient implementation of tate pairing on a mobile phone using java'. Together they form a unique fingerprint.

Cite this