Isogeny computation on Kummer lines and applications
Chao Chen,Fangguo Zhang,Chang-an Zhao
DOI: https://doi.org/10.1016/j.jisa.2023.103546
IF: 4.96
2023-07-09
Journal of Information Security and Applications
Abstract:Isogeny-based cryptography has been the hotspot in recent years owing to its resistance to quantum computing attacks. Unfortunately, efficiency is the main bottleneck that limits its cryptographic applications. Inspired by the efficient implementations of Kummer lines, we formalize the isogenies on Kummer lines. In particular, we derive the explicit formulae of distinct 2-isogenies, consisting of several transforms between different Kummer lines, followed by some appealing isomorphic properties. As an additional contribution, we establish the formulae of odd-degree isogenies and show that 3-isogenies can be decomposed into three similar operations. Furthermore, with appropriate optimizations, we present the algorithms of computing the 2-isogenies over Fp with the ability to obtain the images simultaneously. For the setup of Verifiable Delay Functions and Delay Encryptions, our method reduces the number of operations with the potential of more compact schemes.
computer science, information systems