Breaking the Decisional Diffie-Hellman Problem for Class Group Actions Using Genus Theory

被引:21
作者
Castryck, Wouter [1 ]
Sotakova, Jana [2 ]
Vercauteren, Frederik [1 ]
机构
[1] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
[2] Univ Amsterdam, QuSoft, Amsterdam, Netherlands
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT II | 2020年 / 12171卷
基金
荷兰研究理事会;
关键词
Decisional Diffie-Hellman; Isogeny-based cryptography; Class group action; CSIDH; VOLCANOS; CURVES; SECURE;
D O I
10.1007/978-3-030-56880-1_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we use genus theory to analyze the hardness of the decisional Diffie-Hellman problem (DDH) for ideal class groups of imaginary quadratic orders, acting on sets of elliptic curves through isogenies; such actions are used in the Couveignes-Rostovtsev-Stolbunov protocol and in CSIDH. Concretely, genus theory equips every imaginary quadratic order O with a set of assigned characters chi : cl(O) -> {+/- 1}, and for each such character and every secret ideal class [a] connecting two public elliptic curves E and E' = [a] star E, we show how to compute chi([alpha]) given only E and E', i.e. without knowledge of [a]. In practice, this breaks DDH as soon as the class number is even, which is true for a density 1 subset of all imaginary quadratic orders. For instance, our attack works very efficiently for all supersingular elliptic curves over F-p with p equivalent to 1 mod 4. Our method relies on computing Tate pairings and walking down isogeny volcanoes.
引用
收藏
页码:92 / 120
页数:29
相关论文
共 34 条
[1]   CSI-FiSh: Efficient Isogeny Based Signatures Through Class Group Computations [J].
Beullens, Ward ;
Kleinjung, Thorsten ;
Vercauteren, Frederik .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I, 2019, 11921 :227-247
[2]  
Blake IanF., 2005, Advances in Elliptic Curve Cryptography, V317
[3]  
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
[4]  
Boneh D, 2008, LECT NOTES COMPUT SC, V5157, P108, DOI 10.1007/978-3-540-85174-5_7
[5]   The Magma algebra system .1. The user language [J].
Bosma, W ;
Cannon, J ;
Playoust, C .
JOURNAL OF SYMBOLIC COMPUTATION, 1997, 24 (3-4) :235-265
[6]  
Bosma W., 1996, THEORIE NOMBRES BORD, V8, P283, DOI DOI 10.5802/JTNB.170
[7]   CSIDH on the Surface [J].
Castryck, Wouter ;
Decru, Thomas .
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2020, 2020, 12100 :111-129
[8]  
Castryck W, 2018, LECT NOTES COMPUT SC, V11274, P395, DOI 10.1007/978-3-030-03332-3_15
[9]  
Col`o L., 2019, Orienting supersingular isogeny graphs
[10]  
Couveignes J.-M., 1997, IACR Cryptology ePrint Archive 2006/291