INDIFFERENTIABLE DETERMINISTIC HASHING TO ELLIPTIC AND HYPERELLIPTIC CURVES

被引:0
|
作者
Farashahi, Reza R. [1 ,2 ]
Fouque, Pierre-Alain [3 ]
Shparlinski, Igor E. [1 ]
Tibouchi, Mehdi [3 ]
Voloch, J. Felipe [4 ]
机构
[1] Macquarie Univ, Dept Comp, Sydney, NSW 2109, Australia
[2] Isfahan Univ Technol, Dept Math Sci, Esfahan, Iran
[3] Ecole Normale Super, Dept Informat, Equipe Cryptog, F-75230 Paris 05, France
[4] Univ Texas Austin, Dept Math, Austin, TX 78712 USA
关键词
Elliptic curve cryptography; hashing; random oracle model; exponential sums; pseudorandomness; POINTS; SIGNCRYPTION; SIGNATURES;
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
At Crypto 2010, Brier et al. proposed the first construction of a hash function into ordinary elliptic curves that was indifferentiable from a random oracle, based on Icart's deterministic encoding from Crypto 2009. Such a hash function can be plugged into essentially any cryptosystem that requires hashing into elliptic curves, while not compromising proofs of security in the random oracle model. However, the proof relied on relatively involved tools from algebraic geometry, and only applied to Icart's deterministic encoding from Crypto 2009. In this paper, we present a new, simpler technique based on bounds of character sums to prove the indifferentiability of similar hash function constructions based on any of the known deterministic encodings to elliptic curves or curves of higher genus, such as the algorithms by Shallue, van de Woestijne and Ulas, or the Icart-like encodings recently presented by Kammerer, Lercier and Renault. In particular, we get the first constructions of well-behaved hash functions to Jacobians of hyperelliptic curves. Our technique also provides more precise estimates on the statistical behavior of those deterministic encodings and the hash function constructions based on them. Additionally, we can derive pseudorandomness results for partial bit patterns of such encodings.
引用
收藏
页码:491 / 512
页数:22
相关论文
共 50 条
  • [21] Nonlinear evolution equations and hyperelliptic covers of elliptic curves
    Treibich, Armando
    [J]. REGULAR & CHAOTIC DYNAMICS, 2011, 16 (3-4): : 290 - 310
  • [22] Covers of elliptic curves with complex multiplication by hyperelliptic curves and character sums
    Leprevost, F
    Morain, F
    [J]. JOURNAL OF NUMBER THEORY, 1997, 64 (02) : 165 - 182
  • [23] On the Performance of Provably Secure Hashing with Elliptic Curves
    Kargl, Anton
    Meyer, Bernd
    Wetzel, Susanne
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (10): : 1 - 7
  • [24] PROTOCOLS OF COLLECTIVE DIGITAL SIGNATURE IN ELLIPTIC AND HYPERELLIPTIC CURVES
    Nelasaya, A. V.
    Kozina, G. L.
    Moldovyan, N. A.
    [J]. RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2008, 1 : 127 - 133
  • [25] Computation of the unipotent Albanese map on elliptic and hyperelliptic curves
    Beacom, Jamie
    [J]. ANNALES MATHEMATIQUES DU QUEBEC, 2020, 44 (02): : 201 - 259
  • [26] Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves
    Tian, Song
    Yu, Wei
    Li, Bao
    Wang, Kunpeng
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 181 - 191
  • [27] Improved Weil and Tate pairings for elliptic and hyperelliptic curves
    Eisenträger, K
    Lauter, K
    Montgomery, PL
    [J]. ALGORITHMIC NUMBER THEORY, PROCEEDINGS, 2004, 3076 : 169 - 183
  • [28] Nonlinear evolution equations and hyperelliptic covers of elliptic curves
    Armando Treibich
    [J]. Regular and Chaotic Dynamics, 2011, 16 : 290 - 310
  • [29] Computation of the unipotent Albanese map on elliptic and hyperelliptic curves
    Jamie Beacom
    [J]. Annales mathématiques du Québec, 2020, 44 : 201 - 259
  • [30] Non-isogenous elliptic curves and hyperelliptic jacobians
    Zarhin, Yuri G.
    [J]. MATHEMATICAL RESEARCH LETTERS, 2023, 30 (01) : 267 - 294