Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography 2016
DOI: 10.1145/2898420.2898421
|View full text |Cite
|
Sign up to set email alerts
|

Key Compression for Isogeny-Based Cryptosystems

Abstract: We present a method for key compression in quantum-resistant isogeny-based cryptosystems, which reduces storage and transmission costs of per-party public information by a factor of two, with no effect on the security level of the scheme. We achieve this reduction by compressing both the representation of an elliptic curve, and torsion points on said curve. Compression of the elliptic curve is achieved by associating each j-invariant to a canonical choice of elliptic curve, and the torsion points will be repre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
31
0
5

Year Published

2017
2017
2019
2019

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 72 publications
(36 citation statements)
references
References 25 publications
0
31
0
5
Order By: Relevance
“…Azarderakhsh et al [2] introduced two techniques for compressing parameters in isogenybased cryptosystems. However their implementation was quite slow compared to the runtime of the isogeny computations.…”
Section: Compressionmentioning
confidence: 99%
See 3 more Smart Citations
“…Azarderakhsh et al [2] introduced two techniques for compressing parameters in isogenybased cryptosystems. However their implementation was quite slow compared to the runtime of the isogeny computations.…”
Section: Compressionmentioning
confidence: 99%
“…The first technique of [2] is simple: we can represent an elliptic curve E : y 2 = x 3 +ax+b by its j-invariant j(E) ∈ F p 2 instead of the two parameters a, b ∈ F p 2 , cutting storage requirements by a half.…”
Section: Compressionmentioning
confidence: 99%
See 2 more Smart Citations
“…In 2011, Jao and De Feo presented a new cryptosystem based on the difficulty of constructing isogenies between supersingular elliptic curves, which is still infeasible against the known quantum attacks [5]. In 2016, Azarderakhsh et al proposed a key compression method for supersingular isogeny key exchange, which was later improved by Costello et al [6,7]. Azarderakhsh et al also implemented key exchange protocol on ARM-NEON and FPGA devices [8,9].…”
Section: Introductionmentioning
confidence: 99%