Arithmetic of split Kummer surfaces: Montgomery endomorphism of Edwards products

David Kohel
DOI: https://doi.org/10.48550/arXiv.1601.03680
2016-01-15
Abstract:Let $E$ be an elliptic curve, $\mathcal{K}_1$ its Kummer curve $E/\{\pm1\}$, $E^2$ its square product, and $\mathcal{K}_2$ the split Kummer surface $E^2/\{\pm1\}$. The addition law on $E^2$ gives a large endomorphism ring, which induce endomorphisms of $\mathcal{K}_2$. With a view to the practical applications to scalar multiplication on $\mathcal{K}_1$, we study the explicit arithmetic of $\mathcal{K}_2$.
Number Theory
What problem does this paper attempt to address?
The problem that this paper attempts to solve is about arithmetic operations on split Kummer surfaces, especially the explicit expression of the Montgomery endomorphism on the square product of the Edwards - model elliptic curve. Specifically, the author studies how to use these endomorphisms to optimize the scalar multiplication operation, thereby improving the computational efficiency and security in elliptic curve cryptography. ### Core problems of the paper 1. **Elliptic curves and their related structures**: - The paper first defines an elliptic curve \(E\), its Kummer curve \(K_1 = E/\{\pm1\}\), as well as its square product \(E^2\) and split Kummer surface \(K_2 = E^2/\{\pm1\}\). 2. **Study of endomorphisms**: - By studying the addition law on \(E^2\), a larger endomorphism ring can be obtained, and these endomorphisms can be induced onto \(K_2\). In particular, the author studies the explicit expression of the Montgomery endomorphism \(\phi\), which is helpful for efficient scalar multiplication on \(K_1\). 3. **Specific applications**: - When the Montgomery ladder algorithm is used for scalar multiplication, it can be implemented through recursive formulas. The paper describes in detail the specific forms of these recursive formulas and explores their applications on \(K_2\). 4. **Projective embeddings**: - The paper also studies how to embed the Kummer surface \(K_2\) into projective space in order to better understand and handle these geometric objects. In particular, the author uses Segre embeddings and other methods to construct specific embedding models. 5. **Security and efficiency**: - Finally, the paper shows how to use these explicit expressions and embedding models to optimize computations in elliptic curve cryptography, and in particular provides a simple and effective geometric description in terms of resistance to side - channel attacks. ### Main contributions - It provides the explicit expression of the Montgomery endomorphism on the split Kummer surface, making the scalar multiplication operation more efficient. - It studies the embedding methods of \(K_2\) in different projective spaces, providing a basis for subsequent theoretical analysis and practical applications. - It emphasizes the importance of geometric symmetry in optimizing computations and improving security. Through these studies, the paper provides a new perspective and tool for elliptic curve cryptography, which is helpful for further improving computational efficiency and security.