Another Look At Some Isogeny Hardness Assumptions
Simon-Phillipp Merz, Romy Minko, Christophe Petit
ECC 2019 3 December
1 / 50
Another Look At Some Isogeny Hardness Assumptions Simon-Phillipp - - PowerPoint PPT Presentation
Another Look At Some Isogeny Hardness Assumptions Simon-Phillipp Merz, Romy Minko, Christophe Petit ECC 2019 3 December 1 / 50 Motivation Isogeny based cryptography Another Look at Provable Security Neal Koblitz Dept. of
1 / 50
Another Look at “Provable Security”
Neal Koblitz
koblitz@math.washington.edu
Alfred J. Menezes
ajmeneze@uwaterloo.ca
July 4, 2004∗
Abstract We give an informal analysis and critique of several typical “provable security” results. In some cases there are intuitive but convincing argu- ments for rejecting the conclusions suggested by the formal terminology and “proofs,” whereas in other cases the formalism seems to be consistent with common sense. We discuss the reasons why the search for mathemat- ically convincing theoretical evidence to support the security of public-key systems has been an important theme of researchers. But we argue that the theorem-proof paradigm of theoretical mathematics is often of limited relevance here and frequently leads to papers that are confusing and mis-
it is self-contained and as jargon-free as possible. Key words. Cryptography, Public Key, Provable Security AMS subject classifications. 94A60, 68P25, 11T71
1 Introduction
Suppose that someone is using public-key cryptography to protect credit card numbers during online purchases, maintain confidentiality of medical records, or safeguard national security information. How can she be sure that the system is secure? What type of evidence could convince her that a malicious adversary could not somehow break into the system and learn her secret? At first glance it seems that this question has a straightforward answer. At the heart of any public-key cryptosystem is a “one-way function” — a function
§updated on July 16, 2004; October 25, 2004; March 31, 2005; and May 4, 20051
2 / 50
3 / 50
4 / 50
B
A 5 / 50
6 / 50
7 / 50
8 / 50
9 / 50
B
B′
A
A
10 / 50
11 / 50
12 / 50
13 / 50
14 / 50
15 / 50
16 / 50
17 / 50
18 / 50
19 / 50
20 / 50
21 / 50
22 / 50
23 / 50
[1] David Jao and Vladimir Soukharev. Isogeny-based quantum-resistant undeniablesignatures. InInternational Workshop on Post-Quantum Cryptography, pages 160–179. Springer, 2014. 24 / 50
25 / 50
B
B′
A
A 26 / 50
27 / 50
29 / 50
29 / 50
29 / 50
29 / 50
30 / 50
31 / 50
31 / 50
31 / 50
31 / 50
32 / 50
33 / 50
34 / 50
[1] David Jao and Vladimir Soukharev. Isogeny-based quantum-resistant undeniablesignatures. InInternational Workshop on Post-Quantum Cryptography, pages 160–179. Springer, 2014. 35 / 50
36 / 50
36 / 50
37 / 50
37 / 50
38 / 50
39 / 50
B
40 / 50
41 / 50
42 / 50
B
43 / 50
44 / 50
45 / 50
46 / 50
47 / 50
47 / 50
48 / 50
48 / 50
48 / 50
[1] D Jao and V Soukharev. Isogeny-based quantum-resistant Undeniable Signatures. In International Workshop on Post-Quantum Cryptography, pages 160–179. Springer, 2014. [2] M Seshadri Srinath and V Chandrasekaran. Isogeny-based Quantum-resistant Undeniable Blind Signature
49 / 50
50 / 50