A simple and compact algorithm for sidh with arbitrary degree isogenies

Loading...
Publication Logo

Date

2017

Authors

Craig Costello
Hüseyin Hişil

Journal Title

Journal ISSN

Volume Title

Publisher

Springer Verlag service@springer.de

Open Access Color

Green Open Access

No

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Top 1%
Influence
Top 10%
Popularity
Top 1%

Research Projects

Journal Issue

Abstract

We derive a new formula for computing arbitrary odd-degree isogenies between elliptic curves in Montgomery form. The formula lends itself to a simple and compact algorithm that can efficiently compute any low odd-degree isogenies inside the supersingular isogeny Diffie-Hellman (SIDH) key exchange protocol. Our implementation of this algorithm shows that beyond the commonly used 3-isogenies there is a moderate degradation in relative performance of (2d+ 1) -isogenies as d grows but that larger values of d can now be used in practical SIDH implementations. We further show that the proposed algorithm can be used to both compute isogenies of curves and evaluate isogenies at points unifying the two main types of functions needed for isogeny-based public-key cryptography. Together these results open the door for practical SIDH on a much wider class of curves and allow for simplified SIDH implementations that only need to call one general-purpose function inside the fundamental computation of the large degree secret isogenies. As an additional contribution we also give new explicit formulas for 3- and 4-isogenies and show that these give immediate speedups when substituted into pre-existing SIDH libraries. © 2017 Elsevier B.V. All rights reserved.

Description

Keywords

Isogeny-based Cryptography, Montgomery Curves, Post-quantum Cryptography, Sidh, Computation Theory, Public Key Cryptography, Quantum Cryptography, Security Of Data, Arbitrary Degree, Diffie Hellman, Explicit Formula, Key Exchange Protocols, Montgomery, Post Quantum Cryptography, Relative Performance, Sidh, Cryptography, Computation theory, Public key cryptography, Quantum cryptography, Security of data, Arbitrary degree, Diffie Hellman, Explicit formula, Key exchange protocols, Montgomery, Post quantum cryptography, Relative performance, SIDH, Cryptography, Isogeny-Based Cryptography, Montgomery Curves, Post-Quantum Cryptography, SIDH, Isogeny-based cryptography, Post-quantum cryptography, Montgomery curves, SIDH, 510, 004

Fields of Science

Citation

WoS Q

Scopus Q

OpenCitations Logo
OpenCitations Citation Count
76

Source

23rd Annual International Conference on Theory and Application of Cryptology and Information Security ASIACRYPT 2017

Volume

10625 LNCS

Issue

Start Page

303

End Page

329
PlumX Metrics
Citations

CrossRef : 78

Scopus : 86

Captures

Mendeley Readers : 33

SCOPUS™ Citations

86

checked on Apr 09, 2026

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
25.4333

Sustainable Development Goals

SDG data is not available