Orienteering with one endomorphism

01/26/2022
by   Sarah Arpin, et al.
0

In supersingular isogeny-based cryptography, the path-finding problem reduces to the endomorphism ring problem. Can path-finding be reduced to knowing just one endomorphism? It is known that a small endomorphism enables polynomial-time path-finding and endomorphism ring computation (Love-Boneh [36]). As this paper neared completion, it was shown that the endomorphism ring problem in the presence of one known endomorphism reduces to a vectorization problem (Wesolowski [54]). In this paper, we give explicit classical and quantum algorithms for path-finding to an initial curve using the knowledge of one endomorphism. An endomorphism gives an explicit orientation of a supersingular elliptic curve. We use the theory of oriented supersingular isogeny graphs and algorithms for taking ascending/descending/horizontal steps on such graphs. Although the most general runtimes are subexponential, we show that every supersingular elliptic curve has (potentially large) endomorphisms whose exposure would lead to a classical polynomial-time path-finding algorithm.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/02/2021

The supersingular isogeny path and endomorphism ring problems are equivalent

We prove that the path-finding problem in ℓ-isogeny graphs and the endom...
research
04/30/2022

Failing to hash into supersingular isogeny graphs

An important open problem in supersingular isogeny-based cryptography is...
research
12/02/2019

The supersingular isogeny problem in genus 2 and beyond

Let A/F_p and A'/F_p be supersingular principally polarized abelian vari...
research
09/21/2023

The supersingular endomorphism ring problem given one endomorphism

Given a supersingular elliptic curve E and a non-scalar endomorphism α o...
research
09/19/2023

The supersingular Endomorphism Ring and One Endomorphism problems are equivalent

The supersingular Endomorphism Ring problem is the following: given a su...
research
09/15/2021

The Elliptic Net Algorithm Revisited

Pairings have been widely used since their introduction to cryptography....

Please sign up or login with your details

Forgot password? Click here to reset