Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

New Hybrid Method for Isogeny-Based Cryptosystems Using Edwards Curves

Authors
Kim, SuhriYoon, KisoonKwon, JihoonPark, Young-HoHong, Seokhie
Issue Date
Mar-2020
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Elliptic curve cryptography; Elliptic curves; Computational efficiency; Quantum computing; Protocols; NIST; Isogeny; post-quantum cryptography; montgomery curves; Edwards curves; SIDH
Citation
IEEE TRANSACTIONS ON INFORMATION THEORY, v.66, no.3, pp.1934 - 1943
Indexed
SCIE
SCOPUS
Journal Title
IEEE TRANSACTIONS ON INFORMATION THEORY
Volume
66
Number
3
Start Page
1934
End Page
1943
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/57521
DOI
10.1109/TIT.2019.2938984
ISSN
0018-9448
Abstract
Along with the resistance against quantum computers, isogeny-based cryptography offers attractive cryptosystems due to small key sizes and compatibility with the current elliptic curve primitives. While the state-of-the-art implementation uses Montgomery curves, which facilitates efficient elliptic curve arithmetic and isogeny computations, other forms of elliptic curves can be used to produce an efficient result. In this paper, we present the new hybrid method for isogeny-based cryptosystem using Edwards curves. Unlike the previous hybrid methods, we exploit Edwards curves for recovering the curve coefficients and Montgomery curves for other operations. To this end, we first carefully examine and compare the computational cost of Montgomery and Edwards isogenies. Then, we fine-tune and tailor Edwards isogenies in order to blend with Montgomery isogenies efficiently. Additionally, we present the implementation results of Supersingular Isogeny Diffie-Hellman (SIDH) key exchange using the proposed method. We demonstrate that our method outperforms the previously proposed hybrid method, and is as fast as Montgomery-only implementation. Our results show that proper use of Edwards curves for isogeny-based cryptosystem can be quite practical.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE