A New Isogeny Representation and Applications to Cryptography

نویسندگان

چکیده

This paper focuses on isogeny representations, defined as ways to evaluate isogenies and verify membership the language of isogenous supersingular curves (the set triples $$D,E_1,E_2$$ with a cyclic degree D between $$E_1$$ $$E_2$$ ). The tasks evaluating verifying are fundamental for isogeny-based cryptography. Our main contribution is design suborder representation, new representation targetted at case (big) prime degree. core our method revelation endomorphisms smooth norm inside well-chosen codomain’s endomorphism ring. appears be opening interesting prospects cryptography under hardness computational problem: SubOrder Ideal Problem (SOIP). As an application, we introduce pSIDH, NIKE based representation. Studying assumption particularly crucial in light recent attacks against In order manipulate efficiently develop several heuristic algorithmic tools solve equations family quaternion orders. These algorithms may independent interest.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mathematics of Isogeny Based Cryptography

These lectures notes were written for a summer school on Mathematics for post-quantum cryptography in Thiès, Senegal. They try to provide a guide for Masters’ students to get through the vast literature on elliptic curves, without getting lost on their way to learning isogeny based cryptography. They are by no means a reference text on the theory of elliptic curves, nor on cryptography; student...

متن کامل

Pairing Cryptography Meets Isogeny: A New Framework of Isogenous Pairing Groups

We put forth a new mathematical framework called Isogenous Pairing Groups (IPG) and new intractable assumptions in the framework, the Isogenous DBDH (Isog-DBDH) assumption and its variants. Three operations, i.e., exponentiation, pairing and isogeny on elliptic curves are treated under a unified notion of trapdoor homomorphisms, and combinations of the operations have potential new cryptographi...

متن کامل

Classical and Quantum Algorithms for Isogeny-based Cryptography

Isogeny-based cryptography using supersingular elliptic curves — most prominently, the constructions of De Feo-Jao-Plut — is one of the few practical candidates for post-quantum public key cryptography. Its formidable security claim is earned through the continual exploration of quantum algorithms for ‘isogeny problems’ and the assessment of the threat they pose to supersingular isogeny-based c...

متن کامل

On Fast Calculation of Addition Chains for Isogeny-Based Cryptography

Addition chain calculations play a critical role in determining the e ciency of cryptosystems based on isogenies on elliptic curves. However, nding a minimal length addition chain is not easy; a generalized version of the problem, in which one must nd a chain that simultaneously forms each of a sequence of values, is NP-complete. For the special primes used in such cryptosystems, nding fast add...

متن کامل

Efficient Finite Field Multiplication for Isogeny Based Post Quantum Cryptography

Isogeny based post-quantum cryptography is one of the most recent addition to the family of quantum resistant cryptosystems. In this paper we propose an efficient modular multiplication algorithm for primes of the form p = 2 · 23 − 1 with b even, typically used in such cryptosystem. Our modular multiplication algorithm exploits the special structure present in such primes. We compare the effici...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2022

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-22966-4_1