Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. New SIDH Countermeasures for a More Efficient Key Exchange
 
Loading...
Thumbnail Image
conference paper

New SIDH Countermeasures for a More Efficient Key Exchange

Basso, Andrea
•
Fouotsa, Tako Boris  
Guo, Jian
•
Steinfeld, Ron
2023
Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part VIII
Advances in Cryptology (ASIACRYPT 2023)

The Supersingular Isogeny Diffie-Hellman (SIDH) protocol has been the main and most efficient isogeny-based encryption protocol, until a series of breakthroughs led to a polynomial-time key-recovery attack. While some countermeasures have been proposed, the resulting schemes are significantly slower and larger than the original SIDH. In this work, we propose a new countermeasure technique that leads to significantly more efficient and compact protocols. To do so, we introduce the concept of artificially oriented curves, which are curves with an associated pair of subgroups. We show that this information is sufficient to build parallel isogenies and thus obtain an SIDH-like key exchange, while also revealing significantly less information compared to previous constructions. After introducing artificially oriented curves, we formalize several related computational problems and thoroughly assess their presumed hardness. We then translate the SIDH key exchange to the artificially oriented setting, obtaining the key-exchange protocols binSIDH, or binary SIDH, and terSIDH, or ternary SIDH, which respectively rely on fixed-degree and variable-degree isogenies. Lastly, we also provide a proof-of-concept implementation of the proposed protocols. Despite being implemented in a high-level language, terSIDH has very competitive running times, which suggests that terSIDH might be the most efficient isogeny-based encryption protocol.

  • Files
  • Details
  • Metrics
Type
conference paper
DOI
10.1007/978-981-99-8742-9_7
Author(s)
Basso, Andrea
•
Fouotsa, Tako Boris  
Editors
Guo, Jian
•
Steinfeld, Ron
Date Issued

2023

Publisher

Springer

Publisher place

Singapore

Published in
Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part VIII
ISBN of the book

978-981-99-8741-2

Series title/Series vol.

Lecture Notes in Computer Science; 14445

Start page

208

End page

233

Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LASEC  
Event nameEvent placeEvent date
Advances in Cryptology (ASIACRYPT 2023)

Guangzhou, China

December 4-8, 2023

Available on Infoscience
March 11, 2024
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/206008
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés