A simple and compact algorithm for sidh with arbitrary degree isogenies
Loading...

Date
2017
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Springer Verlag service@springer.de
Open Access Color
Green Open Access
No
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
We derive a new formula for computing arbitrary odd-degree isogenies between elliptic curves in Montgomery form. The formula lends itself to a simple and compact algorithm that can efficiently compute any low odd-degree isogenies inside the supersingular isogeny Diffie-Hellman (SIDH) key exchange protocol. Our implementation of this algorithm shows that beyond the commonly used 3-isogenies there is a moderate degradation in relative performance of (2d+ 1) -isogenies as d grows but that larger values of d can now be used in practical SIDH implementations. We further show that the proposed algorithm can be used to both compute isogenies of curves and evaluate isogenies at points unifying the two main types of functions needed for isogeny-based public-key cryptography. Together these results open the door for practical SIDH on a much wider class of curves and allow for simplified SIDH implementations that only need to call one general-purpose function inside the fundamental computation of the large degree secret isogenies. As an additional contribution we also give new explicit formulas for 3- and 4-isogenies and show that these give immediate speedups when substituted into pre-existing SIDH libraries. © 2017 Elsevier B.V. All rights reserved.
Description
Keywords
Isogeny-based Cryptography, Montgomery Curves, Post-quantum Cryptography, Sidh, Computation Theory, Public Key Cryptography, Quantum Cryptography, Security Of Data, Arbitrary Degree, Diffie Hellman, Explicit Formula, Key Exchange Protocols, Montgomery, Post Quantum Cryptography, Relative Performance, Sidh, Cryptography, Computation theory, Public key cryptography, Quantum cryptography, Security of data, Arbitrary degree, Diffie Hellman, Explicit formula, Key exchange protocols, Montgomery, Post quantum cryptography, Relative performance, SIDH, Cryptography, Isogeny-Based Cryptography, Montgomery Curves, Post-Quantum Cryptography, SIDH, Isogeny-based cryptography, Post-quantum cryptography, Montgomery curves, SIDH, 510, 004
Fields of Science
Citation
WoS Q
Scopus Q

OpenCitations Citation Count
76
Source
23rd Annual International Conference on Theory and Application of Cryptology and Information Security ASIACRYPT 2017
Volume
10625 LNCS
Issue
Start Page
303
End Page
329
Collections
PlumX Metrics
Citations
CrossRef : 78
Scopus : 86
Captures
Mendeley Readers : 33
Google Scholar™


