Orientations and the supersingular endomorphism ring problem
WESOLOWSKI, Benjamin
Lithe and fast algorithmic number theory [LFANT]
Centre National de la Recherche Scientifique [CNRS]
Lithe and fast algorithmic number theory [LFANT]
Centre National de la Recherche Scientifique [CNRS]
WESOLOWSKI, Benjamin
Lithe and fast algorithmic number theory [LFANT]
Centre National de la Recherche Scientifique [CNRS]
< Réduire
Lithe and fast algorithmic number theory [LFANT]
Centre National de la Recherche Scientifique [CNRS]
Langue
en
Communication dans un congrès
Ce document a été publié dans
Advances in Cryptology – EUROCRYPT 2022, Advances in Cryptology – EUROCRYPT 2022, Advances in Cryptology -- Eurocrypt 2022, 2022-05-30, Trondheim. 2022-05-25, vol. 13277, p. 345-371
Springer International Publishing
Résumé en anglais
We study two important families of problems in isogenybased cryptography and how they relate to each other: computing the endomorphism ring of supersingular elliptic curves, and inverting the action of class groups on ...Lire la suite >
We study two important families of problems in isogenybased cryptography and how they relate to each other: computing the endomorphism ring of supersingular elliptic curves, and inverting the action of class groups on oriented supersingular curves. We prove that these two families of problems are closely related through polynomialtime reductions, assuming the generalised Riemann hypothesis. We identify two classes of essentially equivalent problems. The first class corresponds to the problem of computing the endomorphism ring of oriented curves. The security of a large family of cryptosystems (such as CSIDH) reduces to (and sometimes from) this class, for which there are heuristic quantum algorithms running in subexponential time. The second class corresponds to computing the endomorphism ring of orientable curves. The security of essentially all isogeny-based cryptosystems reduces to (and sometimes from) this second class, for which the best known algorithms are still exponential. Some of our reductions not only generalise, but also strengthen previously known results. For instance, it was known that in the particular case of curves defined over $\mathbb{F}_p$, the security of CSIDH reduces to the endomorphism ring problem in subexponential time. Our reductions imply that the security of CSIDH is actually equivalent to the endomorphism ring problem, under polynomial time reductions (circumventing arguments that proved such reductions unlikely).< Réduire
Project ANR
Méthodes pour les variétés abéliennes de petite dimension - ANR-20-CE40-0013
Cryptographie, isogenies et variété abéliennes surpuissantes - ANR-19-CE48-0008
Cryptographie, isogenies et variété abéliennes surpuissantes - ANR-19-CE48-0008
Origine
Importé de halUnités de recherche