Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Supersingular isogeny graph

From Wikipedia, the free encyclopedia
Class of expander graphs arising in computational number theory

In mathematics, thesupersingular isogeny graphs are a class ofexpander graphs that arise incomputational number theory and have been applied inelliptic-curve cryptography. Their vertices representsupersingular elliptic curves overfinite fields and their edges representisogenies between curves.

Definition and properties

[edit]

A supersingular isogeny graph is determined by choosing a largeprime numberp{\displaystyle p} and a small prime number{\displaystyle \ell }, and considering the class of allsupersingular elliptic curves defined over thefinite fieldFp2{\displaystyle \mathbb {F} _{p^{2}}}. There are approximately(p+1)/12{\displaystyle (p+1)/12} such curves, each two of which can be related by isogenies. The vertices in the supersingular isogeny graph represent these curves (or more concretely, theirj-invariants, elements ofFp2{\displaystyle \mathbb {F} _{p^{2}}}) and the edges represent isogenies of degree{\displaystyle \ell } between two curves.[1][2][3]

The supersingular isogeny graphs are+1{\displaystyle \ell +1}-regular graphs, meaning that each vertex has exactly+1{\displaystyle \ell +1} neighbors. They were proven by Pizer to beRamanujan graphs, graphs with optimalexpansion properties for their degree.[1][2][4][5] The proof is based onPierre Deligne's proof of theRamanujan–Petersson conjecture.[4]

Cryptographic applications

[edit]

One proposal for acryptographic hash function involves starting from a fixed vertex of a supersingular isogeny graph, using the bits of the binary representation of an input value to determine a sequence of edges to follow in a walk in the graph, and using the identity of the vertex reached at the end of the walk as the hash value for the input. The security of the proposed hashing scheme rests on the assumption that it is difficult to find paths in this graph that connect arbitrary pairs of vertices.[1]

It has also been proposed to use walks in two supersingular isogeny graphs with the same vertex set but different edge sets (defined using different choices of the{\displaystyle \ell } parameter) to develop a key exchange primitive analogous toDiffie–Hellman key exchange, calledsupersingular isogeny key exchange,[2] suggested as a form ofpost-quantum cryptography.[6] However, a leading variant of supersingular isogeny key exchange was broken in 2022 using non-quantum methods.[7]

References

[edit]
  1. ^abcCharles, Denis X.;Lauter, Kristin E.; Goren, Eyal Z. (2009),"Cryptographic hash functions from expander graphs"(PDF),Journal of Cryptology,22 (1):93–113,doi:10.1007/s00145-007-9002-x,MR 2496385,S2CID 6417679
  2. ^abcDe Feo, Luca; Jao, David; Plût, Jérôme (2014),"Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies"(PDF),Journal of Mathematical Cryptology,8 (3):209–247,doi:10.1515/jmc-2012-0015,MR 3259113,S2CID 10873244
  3. ^Mestre, J.-F. (1986), "La méthode des graphes. Exemples et applications",Proceedings of the international conference on class numbers and fundamental units of algebraic number fields (Katata, 1986), Nagoya University, pp. 217–242,MR 0891898
  4. ^abPizer, Arnold K. (1990), "Ramanujan graphs and Hecke operators",Bulletin of the American Mathematical Society, New Series,23 (1):127–137,doi:10.1090/S0273-0979-1990-15918-X,MR 1027904
  5. ^Pizer, Arnold K. (1998), "Ramanujan graphs",Computational perspectives on number theory (Chicago, IL, 1995), AMS/IP Stud. Adv. Math., vol. 7, American Mathematical Society, pp. 159–178,MR 1486836
  6. ^Eisenträger, Kirsten; Hallgren, Sean;Lauter, Kristin; Morrison, Travis; Petit, Christophe (2018),"Supersingular isogeny graphs and endomorphism rings: Reductions and solutions"(PDF), in Nielsen, Jesper Buus;Rijmen, Vincent (eds.),Advances in Cryptology – EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018, Proceedings, Part III(PDF), Lecture Notes in Computer Science, vol. 10822, Cham: Springer, pp. 329–368,doi:10.1007/978-3-319-78372-7_11,hdl:2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/321916,ISBN 978-3-319-78371-0,MR 3794837,S2CID 4850644
  7. ^Goodin, Dan (August 2, 2022),"Post-quantum encryption contender is taken out by single-core PC and 1 hour: Leave it to mathematicians to muck up what looked like an impressive new algorithm",Ars Technica
Retrieved from "https://en.wikipedia.org/w/index.php?title=Supersingular_isogeny_graph&oldid=1317742743"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp