Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Journal articles
  4. Avoiding Trusted Setup in Isogeny-based Commitments
 
research article

Avoiding Trusted Setup in Isogeny-based Commitments

Saah, Gustave Tchoffo
•
Fouotsa, Tako Boris  
•
Fouotsa, Emmanuel
Show more
May 2, 2025
Designs Codes And Cryptography

In 2021, Sterner proposed a commitment scheme based on supersingular isogenies. For this scheme to be binding, one relies on a trusted party to generate a starting supersingular elliptic curve of unknown endomorphism ring. In fact, the knowledge of the endomorphism ring allows one to compute an endomorphism of degree a power of a given small prime. Such an endomorphism can then be split into two to obtain two different messages with the same commitment. This is the reason why one needs a curve of unknown endomorphism ring, and the only known way to generate such supersingular curves is to rely on a trusted party or on some expensive multiparty computation. We observe that if the degree of the endomorphism in play is well chosen, then the knowledge of the endomorphism ring is not sufficient to efficiently compute such an endomorphism and in some particular cases, one can even prove that endomorphism of a certain degree do not exist. Leveraging these observations, we adapt Sterner's commitment scheme in such a way that the endomorphism ring of the starting curve can be known and public. This allows us to obtain isogeny-based commitment schemes which can be instantiated without trusted setup requirements.

  • Details
  • Metrics
Type
research article
DOI
10.1007/s10623-025-01633-9
Web of Science ID

WOS:001480150300001

Author(s)
Saah, Gustave Tchoffo

University of Yaounde I

Fouotsa, Tako Boris  

École Polytechnique Fédérale de Lausanne

Fouotsa, Emmanuel

Univ Bamenda

Nkuimi-Jugnia, Celestin

University of Yaounde I

Date Issued

2025-05-02

Publisher

SPRINGER

Published in
Designs Codes And Cryptography
Subjects

Supersingular isogenies

•

Post-quantum cryptography

•

Isogeny-based cryptography

•

Commitment scheme

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LASEC  
Available on Infoscience
May 8, 2025
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/249973
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés