Weak Instances of Class Group Action Based Cryptography via Self-pairings

被引:7
作者
Castryck, Wouter [1 ,4 ]
Houben, Marc [1 ,2 ,3 ]
Merz, Simon-Philipp [5 ]
Mula, Marzio [6 ]
van Buuren, Sam [1 ]
Vercauteren, Frederik [1 ]
机构
[1] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
[2] Katholieke Univ Leuven, Dept Wiskunde, Leuven, Belgium
[3] Leiden Univ, Math Inst, Leiden, Netherlands
[4] Univ Ghent, Vakgrp Wiskunde Algebra & Meetkunde, Ghent, Belgium
[5] Royal Holloway Univ London, Informat Secur Grp, Egham, England
[6] Univ Trento, Dipartimento Matemat, Trento, Italy
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT III | 2023年 / 14083卷
基金
欧洲研究理事会;
关键词
Isogeny based cryptography; class group action; self-pairing; DISCRETE LOGARITHM PROBLEM; ELLIPTIC-CURVES;
D O I
10.1007/978-3-031-38548-3_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we study non-trivial self-pairings with cyclic domains that are compatible with isogenies between elliptic curves oriented by an imaginary quadratic order O. We prove that the order m of such a self-pairing necessarily satisfies m | Delta(O) (and even 2m | Delta(O) if 4 | Delta(O) and 4m | Delta(O) if 8 | Delta(O)) and is not a multiple of the field characteristic. Conversely, for each m satisfying these necessary conditions, we construct a family of non-trivial cyclic self-pairings of order m that are compatible with oriented isogenies, based on generalized Weil and Tate pairings. As an application, we identify weak instances of class group actions on elliptic curves assuming the degree of the secret isogeny is known. More in detail, we show that if m(2) | Delta(O) for some prime power m then given two primitively O-oriented elliptic curves (E, iota) and (E', iota') = [a](E,iota) connected by an unknown invertible ideal a subset of O, we can recover a essentially at the cost of a discrete logarithm computation in a group of order m2, assuming the norm of a is given and is smaller than m(2). We give concrete instances, involving ordinary elliptic curves over finite fields, where this turns into a polynomial time attack. Finally, we show that these self-pairings simplify known results on the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves.
引用
收藏
页码:762 / 792
页数:31
相关论文
共 39 条
[1]   The Magma algebra system .1. The user language [J].
Bosma, W ;
Cannon, J ;
Playoust, C .
JOURNAL OF SYMBOLIC COMPUTATION, 1997, 24 (3-4) :235-265
[2]   The Tate pairing for Abelian varieties over finite fields [J].
Bruin, Peter .
JOURNAL DE THEORIE DES NOMBRES DE BORDEAUX, 2011, 23 (02) :323-328
[3]  
Castryck W, 2023, Weak instances of class group action based cryptography via self-pairings
[4]   An Efficient Key Recovery Attack on SIDH [J].
Castryck, Wouter ;
Decru, Thomas .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT V, 2023, 14008 :423-447
[5]   On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves [J].
Castryck, Wouter ;
Houben, Marc ;
Vercauteren, Frederik ;
Wesolowski, Benjamin .
RESEARCH IN NUMBER THEORY, 2022, 8 (04)
[6]   Breaking the Decisional Diffie-Hellman Problem for Class Group Actions Using Genus Theory [J].
Castryck, Wouter ;
Sotakova, Jana ;
Vercauteren, Frederik .
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT II, 2020, 12171 :92-120
[7]   CSIDH on the Surface [J].
Castryck, Wouter ;
Decru, Thomas .
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2020, 2020, 12100 :111-129
[8]  
Castryck W, 2018, LECT NOTES COMPUT SC, V11274, P395, DOI 10.1007/978-3-030-03332-3_15
[9]   Stronger and Faster Side-Channel Protections for CSIDH [J].
Cervantes-Vazquez, Daniel ;
Chenu, Mathilde ;
Chi-Dominguez, Jesus-Javier ;
De Feo, Luca ;
Rodriguez-Henriquez, Francisco ;
Smith, Benjamin .
PROGRESS IN CRYPTOLOGY - LATINCRYPT 2019, 2019, 11774 :173-193
[10]   The SQALE of CSIDH: sublinear Velu quantum-resistant isogeny action with low exponents [J].
Chavez-Saab, Jorge ;
Chi-Dominguez, Jesus-Javier ;
Jaques, Samuel ;
Rodriguez-Henriquez, Francisco .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2022, 12 (03) :349-368