2-Isogenies Between Elliptic Curves in Hesse Model
Resumo
Cryptosystems based on the problem of calculating isogenies between supersingular elliptic curves were recently proposed as strong candidates in the area of Post-Quantum Cryptography. In order to evaluate isogenies applied in cryptography constructions we use the Vèlu formula. However, this formula only applies to elliptic curves in the Weierstrass model. This paper presents morphisms that can be used to construct 2-isogeny formulas for curves in the Hesse model.
Referências
Chen, L., Moody, D., and Liu, Y.-K. (2017). National institute of standards and technology’s post-quantum cryptography standardization.
Jao, D., Azarderakhs, R., Campagna, M., Costello, C., Feo, L. D., Hess, B., Jalali, A., Koziel, B., LaMacchia, B., Longa, P., Naehrig, M., Renes, J., Soukharev, V., and Urbanik, D. (2017). Supersingular isogeny key encapsulation. NIST Post-Quantum Cryptography Standardization,, Round 1 Submission.
Joye, M. and Quisquater, J.-J. (2001). Hessian elliptic curves and side-channel attacks. In Koç, Ç. K., Naccache, D., and Paar, C., editors, Cryptographic Hardware and Embedded Systems — CHES 2001, pages 402–410, Berlin, Heidelberg. Springer Berlin Heidelberg.
Joye, M., Tibouchi, M., and Vergnaud, D. (2010). Huff’s model for elliptic curves.
Moody, D. and Shumow, D. (2011). Analogues of velu’s formulas for isogenies on alternate models of elliptic curves. Cryptology ePrint Archive, Report 2011/430.
Silverman, J. (1986). The arithmetic of elliptic curves. Graduate Texts in Mathematics. Springer-Verlag, first edition.
Vélu, J. (1971). Isogénies entre courbes elliptiques. C.R. Acad. Sc. Paris, Série A(273):238–241.
Washington, L. C. (2008). Elliptic Curves: Number Theory and Cryptography. Chapman & Hall/CRC, second edition.
Xiu Xu, Wei Yu, K. W. X. H. (2016). Constructing isogenies on extended jacobi quartic curves. In International Conference on Information Security and Cryptology, Lecture Notes in Computer Science, pages 416–427. Chen K., Lin D., Yung M. (eds) Information Security and Cryptology, Springer, Cham.