Construction of Secure CabCurves Using Modular Curves
نویسنده
چکیده
This paper proposes a heuristic algorithm which, given a basis of a subspace of the space of cuspforms of weight 2 for Γ0(N) which is invariant for the action of the Hecke operators, tests whether the subspace corresponds to a quotient A of the jacobian of the modular curve X0(N) such that A is the jacobian of a curve C. Moreover, equations for such a curve C are computed which make the quotient suitable for applications in cryptography. One advantage of using such quotients of modular jacobians is that fast methods are known for finding their number of points over finite fields. key words: discrete logarithm, modular curve, hyperelliptic curve, Cab curve
منابع مشابه
Strongly Secure Quantum Ramp Secret Sharing Constructed from Algebraic Curves over Finite Fields
The first construction of strongly secure quantum ramp secret sharing by Zhang and Matsumoto had an undesirable feature that the dimension of quantum shares must be larger than the number of shares. By using algebraic curves over finite fields, we propose a new construction in which the number of shares can become arbitrarily large for fixed dimension of shares.
متن کاملEfficient construction of secure hyperelliptic discrete logarithm problems
Hyperelliptic curves have been used to de ne discrete logarithm problems as cryptographic one-way functions. However, no e cient algorithm for construction of secure hyperelliptic curves is known until now. In this paper, e cient algorithms are presented to construct secure discrete logarithm problems on hyperelliptic curves whose Jacobian varieties are either simple or isogenous to a product o...
متن کاملConstruction of Secure Elliptic Cryptosystems Using CM Tests and Liftings
Elliptic curves over number elds with CM can be used to design non-isogenous elliptic cryptosystems over nite elds e ciently. The existing algorithm to build such CM curves, so-called the CM eld algorithm, is based on analytic expansion of modular functions, costing computations of O(2 5h=2 h 21=4 ) where h is the class number of the endomorphism ring of the CM curve. Thus it is e ective only i...
متن کاملStill better nonlinear codes from modular curves
We give a new construction of nonlinear error-correcting codes over suitable finite fields k from the geometry of modular curves with many rational points over k, combining two recent improvements on Goppa’s construction. The resulting codes are asymptotically the best currently known.
متن کاملQTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000