The security of all private-key bits in isogeny-based schemes

被引:2
|
作者
Shani, Barak [1 ]
机构
[1] Univ Penn, Philadelphia, PA 19104 USA
关键词
Supersingular isogeny Diffie-Hellman; Bit security; Hardcore bits; HIDDEN NUMBER PROBLEM;
D O I
10.1016/j.dam.2019.10.032
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We study the computational hardness of recovering single bits of the private key in the supersingular isogeny Diffie-Hellman (SIDH) key exchange and similar schemes. Our objective is to give a polynomial-time reduction between the problem of computing the private key in SIDH to the problem of computing any of its bits. The parties in the SIDH protocol work over elliptic curve torsion groups of different order N. Our results depend on the parity of N. Our main result shows that if N is odd, then each of the top and lower O(log log N) bits of the private key is as hard to compute, with any noticeable advantage, as the entire key. A similar, but conditional, result holds for each of the middle bits. This condition can be checked, and heuristically holds almost always. The case of even N is a bit more challenging. We give several results, one of which is similar to the result for an odd N, under the assumption that one always succeeds to recover the designated bit. To achieve these results we extend the solution to the chosen-multiplier hidden number problem, for domains of a prime-power order, by studying the Fourier coefficients of single-bit functions over these domains. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:184 / 195
页数:12
相关论文
共 50 条
  • [1] Review of Chosen Isogeny-Based Cryptographic Schemes
    Drzazga, Bartosz
    Krzywiecki, Lukasz
    [J]. CRYPTOGRAPHY, 2022, 6 (02)
  • [2] Isogeny-Based Group Key Establishment Scheme
    Anastasia, Yarmak
    [J]. INTELLIGENT SUSTAINABLE SYSTEMS, WORLDS4 2022, VOL 2, 2023, 579 : 107 - 117
  • [3] Faster Key Compression for Isogeny-Based Cryptosystems
    Zanon, Gustavo H. M.
    Simplicio, Marcos A., Jr.
    Pereira, Geovandro C. C. F.
    Doliskani, Javad
    Barreto, Paulo S. L. M.
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (05) : 688 - 701
  • [4] Faster Isogeny-Based Compressed Key Agreement
    Zanon, Gustavo H. M.
    Simplicio, Marcos A., Jr.
    Pereira, Geovandro C. C. F.
    Doliskani, Javad
    Barreto, Paulo S. L. M.
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2018, 2018, 10786 : 248 - 268
  • [5] Security of private-key encryption based on array codes
    AlJabri, A
    [J]. ELECTRONICS LETTERS, 1996, 32 (24) : 2226 - 2227
  • [6] One private-key for all DL-based cryptosystems
    Pon, SF
    Lu, EH
    Jeng, AB
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (01) : 666 - 672
  • [7] Forward-security in private-key cryptography
    Bellare, M
    Yee, B
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2003, PROCEEDINGS, 2003, 2612 : 1 - 18
  • [8] Normalized Unconditional ε-Security of Private-Key Encryption
    Bi, Lvqing
    Dai, Songsong
    Hu, Bo
    [J]. ENTROPY, 2017, 19 (03)
  • [9] Practical Isogeny-Based Key-Exchange with Optimal Tightness
    de Kock, Bor
    Gjosteen, Kristian
    Veroni, Mattia
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 451 - 479
  • [10] A Key Manipulation Attack on Some Recent Isogeny-Based Key Agreement Protocols
    Gonen, Mehmet Emin
    Tutdere, Seher
    Uzunkol, Osmanbey
    [J]. BULLETIN OF THE IRANIAN MATHEMATICAL SOCIETY, 2022, 48 (02) : 613 - 625