Orientations and the supersingular endomorphism ring problem
WESOLOWSKI, Benjamin
Lithe and fast algorithmic number theory [LFANT]
Centre National de la Recherche Scientifique [CNRS]
Lithe and fast algorithmic number theory [LFANT]
Centre National de la Recherche Scientifique [CNRS]
WESOLOWSKI, Benjamin
Lithe and fast algorithmic number theory [LFANT]
Centre National de la Recherche Scientifique [CNRS]
< Reduce
Lithe and fast algorithmic number theory [LFANT]
Centre National de la Recherche Scientifique [CNRS]
Language
en
Communication dans un congrès
This item was published in
Advances in Cryptology – EUROCRYPT 2022, Advances in Cryptology – EUROCRYPT 2022, Advances in Cryptology -- Eurocrypt 2022, 2022-05-30, Trondheim. 2022-05-25, vol. 13277, p. 345-371
Springer International Publishing
English Abstract
We study two important families of problems in isogenybased cryptography and how they relate to each other: computing the endomorphism ring of supersingular elliptic curves, and inverting the action of class groups on ...Read more >
We study two important families of problems in isogenybased cryptography and how they relate to each other: computing the endomorphism ring of supersingular elliptic curves, and inverting the action of class groups on oriented supersingular curves. We prove that these two families of problems are closely related through polynomialtime reductions, assuming the generalised Riemann hypothesis. We identify two classes of essentially equivalent problems. The first class corresponds to the problem of computing the endomorphism ring of oriented curves. The security of a large family of cryptosystems (such as CSIDH) reduces to (and sometimes from) this class, for which there are heuristic quantum algorithms running in subexponential time. The second class corresponds to computing the endomorphism ring of orientable curves. The security of essentially all isogeny-based cryptosystems reduces to (and sometimes from) this second class, for which the best known algorithms are still exponential. Some of our reductions not only generalise, but also strengthen previously known results. For instance, it was known that in the particular case of curves defined over $\mathbb{F}_p$, the security of CSIDH reduces to the endomorphism ring problem in subexponential time. Our reductions imply that the security of CSIDH is actually equivalent to the endomorphism ring problem, under polynomial time reductions (circumventing arguments that proved such reductions unlikely).Read less <
ANR Project
Méthodes pour les variétés abéliennes de petite dimension - ANR-20-CE40-0013
Cryptographie, isogenies et variété abéliennes surpuissantes - ANR-19-CE48-0008
Cryptographie, isogenies et variété abéliennes surpuissantes - ANR-19-CE48-0008
Origin
Hal imported