Quantum Security Analysis of CSIDH

被引:70
作者
Bonnetain, Xavier [1 ,2 ]
Schrottenloher, Andre [2 ]
机构
[1] Sorbonne Univ, Coll Doctoral, F-75005 Paris, France
[2] Inria, Paris, France
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II | 2020年 / 12106卷
基金
欧洲研究理事会;
关键词
Post-quantum cryptography; Isogeny-based cryptography; Quantum cryptanalysis; Quantum circuits; Hidden shift problem; ALGORITHMS; REDUCTION;
D O I
10.1007/978-3-030-45724-2_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
CSIDH is a recent proposal for post-quantum non-interactive key-exchange, based on supersingular elliptic curve isogenies. It is similar in design to a previous scheme by Couveignes, Rostovtsev and Stolbunov, but aims at an improved balance between efficiency and security. In the proposal, the authors suggest concrete parameters in order to meet some desired levels of quantum security. These parameters are based on the hardness of recovering a hidden isogeny between two elliptic curves, using a quantum subexponential algorithm of Childs, Jao and Soukharev. This algorithm combines two building blocks: first, a quantum algorithm for recovering a hidden shift in a commutative group. Second, a computation in superposition of all isogenies originating from a given curve, which the algorithm calls as a black box. In this paper, we give a comprehensive security analysis of CSIDH. Our first step is to revisit three quantum algorithms for the abelian hidden shift problem from the perspective of non-asymptotic cost, with trade-offs between their quantum and classical complexities. Second, we complete the non-asymptotic study of the black box in the hidden shift algorithm. We give a quantum procedure that evaluates CSIDH-512 using less than 40 000 logical qubits. This allows us to show that the parameters proposed by the authors of CSIDH do not meet their expected quantum security.
引用
收藏
页码:493 / 522
页数:30
相关论文
共 45 条
[11]   Fast heuristic algorithms for computing relations in the class group of a quadratic order, with applications to isogeny evaluation [J].
Biasse, Jean-Francois ;
Fieker, Claus ;
Jacobson, Michael J., Jr. .
LMS JOURNAL OF COMPUTATION AND MATHEMATICS, 2016, 19 :371-390
[12]  
Bonnetain X., 2019, ARXIV
[13]  
Bonnetain X., 2018, IACR Cryptology ePrint Archive, V2018, P537
[14]  
Bonnetain X, 2018, LECT NOTES COMPUT SC, V11272, P560, DOI 10.1007/978-3-030-03326-2_19
[15]  
Castryck W, 2018, LECT NOTES COMPUT SC, V11274, P395, DOI 10.1007/978-3-030-03332-3_15
[16]   Cryptographic Hash Functions from Expander Graphs [J].
Charles, Denis X. ;
Lauter, Kristin E. ;
Goren, Eyal Z. .
JOURNAL OF CRYPTOLOGY, 2009, 22 (01) :93-113
[17]  
Cheung KKH, 2001, QUANTUM INF COMPUT, V1, P26
[18]  
Chi DP, 1999, LECT NOTES COMPUT SC, V1509, P148
[19]   Constructing elliptic curve isogenies in quantum subexponential time [J].
Childs, Andrew ;
Jao, David ;
Soukharev, Vladimir .
JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2014, 8 (01) :1-29
[20]  
COHEN H, 1984, LECT NOTES MATH, V1068, P33