Section 3.2 Supersingular isogeny graph cryptography (Asra)
¶Proposition 3.2.1.
If G is a Ramanujan graph, x\in V, S\subseteq V\text{.} For a sufficiently large path beginning at x\text{,} the probability that the path ends in S is at least |S|/2|V|\text{.}
Subsection 3.2.1 Hash functions
(2010) (Charles, Goren, Lauter) proposed a cryptographically secure hash function based on the hardness of computing paths in a supersingular isogeny graphs.Definition 3.2.2. Hash functions.
A hash function is a deterministic function h\colon \{0,1\}^* \to \{0,1\}^n\text{.}
Definition 3.2.3. Collision resistance.
A hash function h is collision resistant if its hard to find x_1,x_2 with x_1\ne x_2 s.t. h(x_1) = h(x_2)\text{.}
Definition 3.2.4. Preimage resistance.
A hash function h is preimage resistant if given y\in \{0,1\}^n its hard to find x s.t. h(x) = y\text{.}
Subsection 3.2.2 Supersingular isogeny hash functions
Parameters.
G_l(\FF_{p^2})\text{,} p \equiv 1 \pmod{12}\text{,} l to be small, fix an ordering on the edges, fix an initial vertex j_0 and an incoming edge.Protocol.
m \in \{0,1\}^* write this as an l-bit string, m \in \{0,1,\ldots, l-1\}^*\text{,} walk the graph based on m without backtracking. Map the final j invariant to \{0,1\}^{n\approx \log p}\text{.}Properties.
Difficult means exponential in the size of the input normally.Proposition 3.2.5.
- Preimage resistant iff when given j it is difficult to compute a positive integer e and an isogeny \phi\colon E_{j_0} \to E_j with degree l^e\text{.}
- Collision resistant iff when given j it is difficult to compute e and \phi \colon E_{j_0} \to E_{j_0} with degree l^e\text{.}
Subsection 3.2.3 Diffie-Hellman Key Exchange (1976)
Choose p,\, \ZZ/p, g then Alice computes g^a send to Bob, he computes g^b and sends it back, they both compute g^{ab}\text{,} which is their shared secret. The security is based on the hardness of computing g^{ab} given g^a,g^b\text{.}Subsection 3.2.4 Supersingular isogeny Diffie-Hellman (SIDH)
Parameters.
Supersingular elliptic curve of smooth order: fix p to be big enough p = l_A^{e_A} l_B^{e_B} f \pm 1\text{.} l_A,l_B small primes, f is a number chosen such that p is big. Construct a supersingular elliptic curve E such that \# E(\FF_{p^2}) = (l_A^{e_A}l_B^{e_B} f)^2\text{,} using Broker's algorithm. Construct bases (P_A, Q_A) for E\lb l_A^{e_A}\rb\text{,} (P_B, Q_B) for E\lb l_B^{e_B}\rb\text{.}Protocol.
Alice takes m_A,n_A \in \ZZ/l_A^{e_A} Bob takes m_B,n_B \in \ZZ/l_B^{e_B} Alice finds R_A = m_AP_A + n_AQ_A Bob finds R_B = m_BP_B + n_BQ_B Alice finds \phi_A \colon E \to E/\langle R_A\rangle = E_A Bob finds \phi_B \colon E \to E/\langle R_B\rangle = E_B They send each other E_i, \phi_i(P_i),\phi_i(Q_i)\text{.} Both compute \phi'_A\colon E_B \to E_B/\langle m_A\phi_B(P_A) + n_A\phi_B(Q_A)\rangle or analogous. Shared secret is j(E_{AB})\text{.}Hardness.
- (Decisional supersingular isogeny problem) Given E, (P_A,Q_A) a basis for l_A^{e_A} torsion, let E_A be another curve, is E_A l_A^{e_A} isogenous to E\text{?}
- (Computational supersingular isogeny problem) Let \phi_A \colon E \to E_A be an isogeny with a kernel of the form \langle m_AP_A + n_AQ_A \rangle\text{.} Given E_A and \phi_A(P_B) \phi_A(Q_B)\text{,} find R_A\text{.} p^{1/4} classical, p^{1/6} quantum.
- Given E_A, E_B, \phi_A(P_B), \phi_A(Q_B), \phi_B(P_A), \phi_B(Q_A) find j-invariant of E_{AB}\text{.}
Subsection 3.2.5 Supersingular isogeny public key
Classically DH key-exchange \leadsto ElGamal encryption.-
Key generation.
Alice: secret \phi_A \colon E \to E_A\text{,} public E_A and \phi_A(P_B), \phi_A(Q_B)\text{.}
-
Encryption.
Bob: choose \phi_B \colon E \to E_B\text{,} compute j(E_{AB})\text{.}
Send Alice c = (E_B, \phi_B(P_A), \phi_B(Q_A), m\oplus j(E_{AB}))
-
Decryption.
Alice use (E_B, \phi_B(P_A), \phi_B(Q_A)) to compute j(E_{AB})\text{.} Computes (m\oplus j(E_{AB})) \oplus j(E_{AB}) = m\text{.}
Subsection 3.2.6 Algorithmic aspects
- (Choosing f) Prime number theorem for arithmetic progressions gives you a bound on the density of primes of the form l_A^{e_A} l_B^{e_B} f \pm 1
- Choosing a s.s. e.c. with the right group order, Broker's algorithm.
-
Finding a basis for E\lb l_A^{e_A}\rb\text{.}
- Find a random point in E(\FF_{p^2}) say P\text{.}
- Check the order of (l_B^{e_B} f)^2 \cdot P\text{.} If its l_A^{e_A} set P_A = P\text{.} Otherwise repeat from 1.
- Do the same with Q_A = Q\text{.}
- Check independence by seeing if e(P_A,Q_A) has the right order, so that it is in E\lb l_A^{e_A} \rb torsion.
- Computing the kernels generated by R_A = m_A P_A + n_A Q_A\text{,} m_A, n_A \in \ZZ/l_A^{e_A} \ZZ\text{.} Analogue of double and add. Set R_A = P_A + \lb m_A\inv n_A\rb Q_A\text{.} Use differential addition (when you compute A+B with side info A-B) and a Montgomery ladder
- (Computing smooth degree isogenies) Decompose the l_A^{e_A} isogeny into e_A different l_A-isogenies, \phi_i\colon E_i \to E_{i+1} the kernel of \phi_i is \langle l_A^{e_A - i - 1} R_A\rangle\text{.} Vélu's formula runs in O(l) for l-isogeny.