Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems

Springer Science and Business Media LLC - Tập 33 - Trang 130-175 - 2019
Steven D. Galbraith1, Christophe Petit2, Javier Silva3
1Mathematics Department, University of Auckland, Auckland, New Zealand
2School of Computer Science, University of Birmingham, Birmingham, UK
3Universitat Pompeu Fabra, Barcelona, Spain

Tóm tắt

We present signature schemes whose security relies on computational assumptions relating to isogeny graphs of supersingular elliptic curves. We give two schemes, both of them based on interactive identification protocols. The first identification protocol is due to De Feo, Jao and Plût. The second one, and the main contribution of the paper, makes novel use of an algorithm of Kohel, Lauter, Petit and Tignol for the quaternion version of the $$\ell $$-isogeny problem, for which we provide a more complete description and analysis, and is based on a more standard and potentially stronger computational problem. Both identification protocols lead to signatures that are existentially unforgeable under chosen message attacks in the random oracle model using the well-known Fiat-Shamir transform, and in the quantum random oracle model using another transform due to Unruh. A version of the first signature scheme was independently published by Yoo, Azarderakhsh, Jalali, Jao and Soukharev. This is the full version of a paper published at ASIACRYPT 2017.

Tài liệu tham khảo

N. Alon, I. Benjamini, E. Lubetzky, S. Sodin, Non-backtracking random walks mix faster. Commun. Contem. Math. 9(4), 585–603 (2007)

G. Bertoni, J. Daemen, M. Peeters, G. Van Assche, Cryptographic sponge functions. Submission to NIST (Round 3) (2011)

I. Damgård, On $\sigma $-protocols. Lecture Notes, University of Aarhus, Department for Computer Science (2010)

P. Deligne, La conjecture de Weil. I. Publications Mathématiques de l’Institut des Hautes Études Scientifiques 43(1), 273–307 (1974)

L. Dewaghe, Isogénie entre courbes elliptiques. Util. Math. 55, 123–127 (1999)

S. Goldfeder, M. Chase, G. Zaverucha, Efficient post-quantum zero-knowledge and signatures (draft). Cryptology ePrint Archive, Report 2016/1110 (2016). http://eprint.iacr.org/2016/1110

J. Katz, Digital Signatures. (Springer, Berlin, 2010)

J. Katz, Y. Lindell, Introduction to Modern Cryptography. (CRC Press, Boca Raton, 2014)

D. Kohel, Endomorphism rings of elliptic curves over finite fields. PhD thesis, University of California, Berkeley (1996)

D. Venturi, Zero-knowledge proofs and applications. Lecture Notes, University of Rome (2015)

M.-F. Vignéras, Arithmétique des algébres de quaternions. (Springer, Berlin, 1980)

J. Vélu, Isogénies entre courbes elliptiques. Communications de l’Académie royale des Sciences de Paris 273, 238–241 (1971)

J. Voight, Quaternion algebras (2017). https://math.dartmouth.edu/~jvoight/quat-book.pdf