Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants

نویسندگان

  • Craig Costello
  • Alyson Deines-Schartz
  • Kristin E. Lauter
  • Tonghai Yang
چکیده

This paper presents an algorithm to construct cryptographically strong genus 2 curves and their Kummer surfaces via Rosenhain invariants and related Kummer parameters. The most common version of the complex multiplication (CM) algorithm for constructing cryptographic curves in genus 2 relies on the well-studied Igusa invariants and Mestre’s algorithm for reconstructing the curve. On the other hand, the Rosenhain invariants typically have much smaller height, so computing them requires less precision, and in addition, the Rosenhain model for the curve can be written down directly given the Rosenhain invariants. Similarly, the parameters for a Kummer surface can be expressed directly in terms of rational functions of theta constants. CM-values of these functions are algebraic numbers, and when computed to high enough precision, LLL can recognize their minimal polynomials. Motivated by fast cryptography on Kummer surfaces, we investigate a variant of the CM method for computing cryptographically strong Rosenhain models of curves (as well as their associated Kummer surfaces) and use it to generate several example curves at different security levels that are suitable for use in cryptography.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Constructing genus 3 hyperelliptic Jacobians with CM

Given a sextic CM field K, we give an explicit method for finding all genus 3 hyperelliptic curves defined over C whose Jacobians are simple and have complex multiplication by the maximal order of this field, via an approximation of their Rosenhain invariants. Building on the work of Weng [27], we give an algorithm which works in complete generality, for any CM sextic field K, and computes mini...

متن کامل

Constructing Abelian Varieties for Pairing-Based Cryptography

Constructing Abelian Varieties for Pairing-Based Cryptography

متن کامل

Higher Order Invariants of Immersions of Surfaces into 3-space

Finite order invariants of stable immersions of a closed orientable surface into R have been defined in [N], where all order 1 invariants have been classified. In the present work we classify all finite order invariants of order n > 1, and show that they are all functions of the universal order 1 invariant constructed in [N]. The structure of the paper is as follows: In Section 2 we summarize t...

متن کامل

Trilinear maps for cryptography

We construct cryptographic trilinear maps that involve simple, non-ordinary abelian varieties over finite fields. In addition to the discrete logarithm problems on the abelian varieties, the cryptographic strength of the trilinear maps is based on a discrete logarithm problem on the quotient of certain modules defined through the N\'{e}ron-Severi groups. The discrete logarithm problem is reduci...

متن کامل

A Note on Invariants of Flows Induced by Abelian Differentials on Riemann Surfaces

The real and imaginary part of any Abelian differential on a compact Riemann surface define two flows on the underlying compact orientable C surface. Furthermore, these flows induce an interval exchange transformation on every transversal simple closed curve, via Poincaré recurrence. This note shows that the ordered K0groups of several Calgebras naturally associated to one of the flows resp. in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014