New Hybrid Method for Isogeny-Based Cryptosystems Using Edwards Curves
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Suhri | - |
dc.contributor.author | Yoon, Kisoon | - |
dc.contributor.author | Kwon, Jihoon | - |
dc.contributor.author | Park, Young-Ho | - |
dc.contributor.author | Hong, Seokhie | - |
dc.date.accessioned | 2021-08-31T08:55:16Z | - |
dc.date.available | 2021-08-31T08:55:16Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2020-03 | - |
dc.identifier.issn | 0018-9448 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/57521 | - |
dc.description.abstract | Along with the resistance against quantum computers, isogeny-based cryptography offers attractive cryptosystems due to small key sizes and compatibility with the current elliptic curve primitives. While the state-of-the-art implementation uses Montgomery curves, which facilitates efficient elliptic curve arithmetic and isogeny computations, other forms of elliptic curves can be used to produce an efficient result. In this paper, we present the new hybrid method for isogeny-based cryptosystem using Edwards curves. Unlike the previous hybrid methods, we exploit Edwards curves for recovering the curve coefficients and Montgomery curves for other operations. To this end, we first carefully examine and compare the computational cost of Montgomery and Edwards isogenies. Then, we fine-tune and tailor Edwards isogenies in order to blend with Montgomery isogenies efficiently. Additionally, we present the implementation results of Supersingular Isogeny Diffie-Hellman (SIDH) key exchange using the proposed method. We demonstrate that our method outperforms the previously proposed hybrid method, and is as fast as Montgomery-only implementation. Our results show that proper use of Edwards curves for isogeny-based cryptosystem can be quite practical. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | New Hybrid Method for Isogeny-Based Cryptosystems Using Edwards Curves | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hong, Seokhie | - |
dc.identifier.doi | 10.1109/TIT.2019.2938984 | - |
dc.identifier.scopusid | 2-s2.0-85076960692 | - |
dc.identifier.wosid | 000519925900036 | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON INFORMATION THEORY, v.66, no.3, pp.1934 - 1943 | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON INFORMATION THEORY | - |
dc.citation.title | IEEE TRANSACTIONS ON INFORMATION THEORY | - |
dc.citation.volume | 66 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 1934 | - |
dc.citation.endPage | 1943 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordAuthor | Elliptic curve cryptography | - |
dc.subject.keywordAuthor | Elliptic curves | - |
dc.subject.keywordAuthor | Computational efficiency | - |
dc.subject.keywordAuthor | Quantum computing | - |
dc.subject.keywordAuthor | Protocols | - |
dc.subject.keywordAuthor | NIST | - |
dc.subject.keywordAuthor | Isogeny | - |
dc.subject.keywordAuthor | post-quantum cryptography | - |
dc.subject.keywordAuthor | montgomery curves | - |
dc.subject.keywordAuthor | Edwards curves | - |
dc.subject.keywordAuthor | SIDH | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.