Trilinear maps for cryptography

03/27/2018
by   Ming-Deh A. Huang, et al.
0

We construct cryptographic trilinear maps that involve simple, non-ordinary abelian varieties over finite fields. In addition to the discrete logarithm problems on the abelian varieties, the cryptographic strength of the trilinear maps is based on a discrete logarithm problem on the quotient of certain modules defined through the Néron-Severi groups. The discrete logarithm problem is reducible to constructing an explicit description of the algebra generated by two non-commuting endomorphisms, where the explicit description consists of a linear basis with the two endomorphisms expressed in the basis, and the multiplication table on the basis. It is also reducible to constructing an effective Z-basis for the endomorphism ring of a simple non-ordinary abelian variety. Both problems appear to be challenging in general and require further investigation.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/19/2019

Weil descent and cryptographic trilinear maps

It has recently been shown that cryptographic trilinear maps are suffici...
research
10/08/2018

Trilinear maps for cryptography II

We continue to study the construction of cryptographic trilinear maps in...
research
02/18/2020

Algebraic blinding and cryptographic trilinear maps

It has been shown recently that cryptographic trilinear maps are suffici...
research
11/07/2020

Constructing Cryptographic Multilinear Maps Using Affine Automorphisms

The point of this paper is to use affine automorphisms from algebraic ge...
research
02/08/2021

Cryptographic multilinear maps using pro-p groups

To any nilpotent group of class n, one can associate a non-interactive k...
research
02/21/2019

Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory

The present survey reports on the state of the art of the different cryp...
research
07/16/2018

Restructuring of Discrete Logarithm Problem and ElGamal Cryptosystem by Using the Power Fibonacci Sequence Module M

In this paper, we have studied on adapting to asymmetric cryptography po...

Please sign up or login with your details

Forgot password? Click here to reset