Commitment Schemes from Supersingular Elliptic Curve Isogeny Graphs
PDF

Keywords

post-quantum cryptography
public-key cryptography
commitment schemes
isogeny-based cryptography
isogeny graphs

How to Cite

Sterner, B. (2022). Commitment Schemes from Supersingular Elliptic Curve Isogeny Graphs. Mathematical Cryptology, 1(2), 40–51. Retrieved from https://journals.flvc.org/mathcryptology/article/view/130656

Abstract

In this work we present two commitment schemes based on hardness assumptions arising from supersingular elliptic curve isogeny graphs, which possess strong security properties. The first is based on the CGL hash function while the second is based on the SIDH framework, both of which require a trusted third party for the setup phase. The proofs of security of these protocols depend on properties of non-backtracking random walks on regular graphs. The optimal efficiency of these protocols depends on the size of a certain constant, defined in the paper, related to relevant isogeny graphs, which we give conjectural upper bounds for.

PDF
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Copyright (c) 2022 Bruno Sterner