Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. PEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogenies
 
conference paper

PEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogenies

Dartois, Pierrick
•
Eriksen, Jonathan Komada
•
Fouotsa, Tako Boris  
Show more
August 17, 2025
Advances in Cryptology – CRYPTO 2025
45th Annual International Cryptology Conference

In this paper, we present the first practical algorithm to compute an effective group action of the class group of any imaginary quadratic order on a set of supersingular elliptic curves primitively oriented by . Effective means that we can act with any element of the class group directly, and are not restricted to acting by products of ideals of small norm, as for instance in CSIDH. Such restricted effective group actions often hamper cryptographic constructions, e.g. in signature or MPC protocols.

Our algorithm is a refinement of the Clapoti approach by Page and Robert, and uses -dimensional isogenies. As such, it runs in polynomial time, does not require the computation of the structure of the class group, nor expensive lattice reductions, and our refinements allows it to be instantiated with the orientation given by the Frobenius endomorphism. This makes the algorithm practical even at security levels as high as CSIDH-4096. Our implementation in SageMath takes 1.5s to compute a group action at the CSIDH-512 security level, 21s at CSIDH-2048 level and around 2 minutes at the CSIDH-4096 level. This marks the first instantiation of an effective cryptographic group action at such high security levels. For comparison, the recent KLaPoTi approach requires around 200s at the CSIDH-512 level in SageMath and 2.5s in Rust.

  • Files
  • Details
  • Metrics
Type
conference paper
DOI
10.1007/978-3-032-01855-7_3
Author(s)
Dartois, Pierrick

University of Bordeaux

Eriksen, Jonathan Komada

KU Leuven

Fouotsa, Tako Boris  

EPFL

Herlédan Le Merdy, Arthur

ENS de Lyon

Invernizzi, Riccardo

KU Leuven

Robert, Damien

University of Bordeaux

Rueger, Ryan

Technische Universität München

Vercauteren, Frederik

KU Leuven

Wesolowski, Benjamin

ENS de Lyon

Date Issued

2025-08-17

Publisher

Springer Nature Switzerland

Publisher place

Cham

Published in
Advances in Cryptology – CRYPTO 2025
DOI of the book
10.1007/978-3-032-01855-7
ISBN of the book

978-3-032-01855-7

978-3-032-01854-0

Series title/Series vol.

Lecture Notes in Computer Science; 16000

ISSN (of the series)

1611-3349

Start page

67

End page

99

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LASEC  
Event nameEvent acronymEvent placeEvent date
45th Annual International Cryptology Conference

CRYPTO 2025

Santa Barbara, California, USA

2025-08-17 - 2025-08-21

FunderFunding(s)Grant NumberGrant URL

European Union’s Horizon 2020

ISOCRYPT

101020788

SNSF

CryptonIs: Advanced Cryptography Based on Isogenies

213766

https://data.snf.ch/grants/grant/213766
Available on Infoscience
September 5, 2025
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/253771
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés