INDIFFERENTIABLE DETERMINISTIC HASHING TO ELLIPTIC AND HYPERELLIPTIC CURVES

被引:0
|
作者
Farashahi, Reza R. [1 ,2 ]
Fouque, Pierre-Alain [3 ]
Shparlinski, Igor E. [1 ]
Tibouchi, Mehdi [3 ]
Voloch, J. Felipe [4 ]
机构
[1] Macquarie Univ, Dept Comp, Sydney, NSW 2109, Australia
[2] Isfahan Univ Technol, Dept Math Sci, Esfahan, Iran
[3] Ecole Normale Super, Dept Informat, Equipe Cryptog, F-75230 Paris 05, France
[4] Univ Texas Austin, Dept Math, Austin, TX 78712 USA
关键词
Elliptic curve cryptography; hashing; random oracle model; exponential sums; pseudorandomness; POINTS; SIGNCRYPTION; SIGNATURES;
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
At Crypto 2010, Brier et al. proposed the first construction of a hash function into ordinary elliptic curves that was indifferentiable from a random oracle, based on Icart's deterministic encoding from Crypto 2009. Such a hash function can be plugged into essentially any cryptosystem that requires hashing into elliptic curves, while not compromising proofs of security in the random oracle model. However, the proof relied on relatively involved tools from algebraic geometry, and only applied to Icart's deterministic encoding from Crypto 2009. In this paper, we present a new, simpler technique based on bounds of character sums to prove the indifferentiability of similar hash function constructions based on any of the known deterministic encodings to elliptic curves or curves of higher genus, such as the algorithms by Shallue, van de Woestijne and Ulas, or the Icart-like encodings recently presented by Kammerer, Lercier and Renault. In particular, we get the first constructions of well-behaved hash functions to Jacobians of hyperelliptic curves. Our technique also provides more precise estimates on the statistical behavior of those deterministic encodings and the hash function constructions based on them. Additionally, we can derive pseudorandomness results for partial bit patterns of such encodings.
引用
收藏
页码:491 / 512
页数:22
相关论文
共 50 条
  • [41] Two-loop integral reduction from elliptic and hyperelliptic curves
    Georgoudis, Alessandro
    Zhang, Yang
    [J]. JOURNAL OF HIGH ENERGY PHYSICS, 2015, (12): : 1 - 26
  • [42] Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields
    Fan, Xuejun
    Tian, Song
    Li, Bao
    Li, Weixuan
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 630 - 638
  • [43] Efficient computation of rank of elliptic curves using hyperelliptic curves associated with the simplest cubic fields
    Kim, JS
    [J]. PROCEEDINGS OF THE JAPAN ACADEMY SERIES A-MATHEMATICAL SCIENCES, 2000, 76 (09) : 129 - 131
  • [44] Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time
    Kammerer, Jean-Gabriel
    Lercier, Reynald
    Renault, Guenael
    [J]. PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 278 - +
  • [45] Deterministic primality tests based on tori and elliptic curves
    Gurevich, Alexander
    Kunyavskii, Boris
    [J]. FINITE FIELDS AND THEIR APPLICATIONS, 2012, 18 (01) : 222 - 236
  • [46] ELLIPTIC CURVES WITH COMMON TORSION x-COORDINATES AND HYPERELLIPTIC TORSION PACKETS
    Fu, Hang
    Stoll, Michael
    [J]. PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY, 2022, 150 (12) : 5137 - 5149
  • [47] Hyperelliptic modular curves X0(n) and isogenies of elliptic curves over quadratic fields
    Bruin, Peter
    Najman, Filip
    [J]. LMS JOURNAL OF COMPUTATION AND MATHEMATICS, 2015, 18 (01): : 578 - 602
  • [48] Hashing to Elliptic Curves of j=0 and Mordell-Weil Groups
    Koshelev, D.
    [J]. MATHEMATICAL NOTES, 2020, 108 (5-6) : 748 - 751
  • [49] Jacobian groups of hyperelliptic curves in hyperelliptic cryptosystems
    You, L
    Fan, Y
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2003, 12 (04) : 642 - 647
  • [50] Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
    Fouque, Pierre-Alain
    Tibouchi, Mehdi
    [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2010, 2010, 6212 : 81 - 91