Results 1 to 10 of about 122 (48)

Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves [PDF]

open access: yesJournal of Mathematical Cryptology, 2020
We describe a framework for constructing an efficient non-interactive key exchange (NIKE) protocol for n parties for any n ≥ 2. Our approach is based on the problem of computing isogenies between isogenous elliptic curves, which is believed to be ...
Boneh Dan   +7 more
doaj   +3 more sources

Orienting supersingular isogeny graphs

open access: yesJournal of Mathematical Cryptology, 2020
We introduce a category of 𝓞-oriented supersingular elliptic curves and derive properties of the associated oriented and nonoriented ℓ-isogeny supersingular isogeny graphs.
Colò Leonardo, Kohel David
exaly   +2 more sources

Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies

open access: yesJournal of Mathematical Cryptology, 2014
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular elliptic curves. The main technical idea in our scheme is that we transmit the images of torsion bases
Luca De Feo, David Jao
exaly   +2 more sources

Isolated elliptic curves and the MOV attack

open access: yesJournal of Mathematical Cryptology, 2017
We present a variation on the CM method that produces elliptic curves over prime fields with nearly prime order that do not admit many efficiently computable isogenies. Assuming the Bateman–Horn conjecture, we prove that elliptic curves produced this way
Travis Scholl
exaly   +2 more sources

On a theorem of Tate

open access: yesCentral European Journal of Mathematics, 2008
Fedor A Bogomolov, Yuri Tschinkel
exaly   +2 more sources

On the supersingular GPST attack

open access: yesJournal of Mathematical Cryptology, 2021
The main attack against static-key supersingular isogeny Diffie–Hellman (SIDH) is the Galbraith–Petit–Shani–Ti (GPST) attack, which also prevents the application of SIDH to other constructions such as non-interactive key-exchange.
Basso Andrea, Pazuki Fabien
doaj   +1 more source

Isogenies on twisted Hessian curves

open access: yesJournal of Mathematical Cryptology, 2021
Elliptic curves are typically defined by Weierstrass equations. Given a kernel, the well-known Vélu's formula shows how to explicitly write down an isogeny between Weierstrass curves. However, it is not clear how to do the same on other forms of elliptic
Perez Broon Fouazou Lontouo   +3 more
doaj   +1 more source

AN IDENTITY-BASED ENCRYPTION SCHEME USING ISOGENY OF ELLIPTIC CURVES [PDF]

open access: yes, 2021
Identity-Based Encryption is a public key cryptosystem that uses the receiver identifier information such as email address, IP address, name and etc, to compute a public and a private key in a cryptosystem and encrypt a message.
Bahramian, Mojtaba, Hajirezaei, Elham
core   +1 more source

A subexponential-time, polynomial quantum space algorithm for inverting the CM group action

open access: yesJournal of Mathematical Cryptology, 2020
We present a quantum algorithm which computes group action inverses of the complex multiplication group action on isogenous ordinary elliptic curves, using subexponential time, but only polynomial quantum space.
Jao David   +3 more
doaj   +1 more source

Hash functions from superspecial genus-2 curves using Richelot isogenies

open access: yesJournal of Mathematical Cryptology, 2020
In 2018 Takashima proposed a version of Charles, Goren and Lauter’s hash function using Richelot isogenies, starting from a genus-2 curve that allows for all subsequent arithmetic to be performed over a quadratic finite field 𝔽p2.
Castryck Wouter   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy