Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves

07/09/2018
by   Dan Boneh, et al.
0

We describe a framework for constructing an efficient non-interactive key exchange (NIKE) protocol for n parties for any n >= 2. Our approach is based on the problem of computing isogenies between isogenous elliptic curves, which is believed to be difficult. We do not obtain a working protocol because of a missing step that is currently an open problem. What we need to complete our protocol is an efficient algorithm that takes as input an abelian variety presented as a product of isogenous elliptic curves, and outputs an isomorphism invariant of the abelian variety. Our framework builds a cryptographic invariant map, which is a new primitive closely related to a cryptographic multilinear map, but whose range does not necessarily have a group structure. Nevertheless, we show that a cryptographic invariant map can be used to build several cryptographic primitives, including NIKE, that were previously constructed from multilinear maps and indistinguishability obfuscation.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/19/2019

Weil descent and cryptographic trilinear maps

It has recently been shown that cryptographic trilinear maps are suffici...
research
04/26/2018

Accelerating the Couveignes Rostovtsev Stolbunov key exchange protocol

We study a key exchange protocol based on isogenies between ordinary ell...
research
06/03/2020

An Authenticated Key Scheme over Elliptic Curves for Topological Networks

Nodes of sensor networks may be resource-constrained devices, often havi...
research
02/18/2020

Algebraic blinding and cryptographic trilinear maps

It has been shown recently that cryptographic trilinear maps are suffici...
research
06/03/2020

An Authenticated Key Scheme over Elliptic Curves and Security Considerations

Nodes of sensor networks may be resource-constrained devices, often havi...
research
03/23/2021

Efficient Multilinear Map from Graded Encoding Scheme

Though the multilinear maps have many cryptographic applications, secure...
research
12/27/2020

Towards Threshold Key Exchange Protocols

Threshold schemes exist for many cryptographic primitives like signature...

Please sign up or login with your details

Forgot password? Click here to reset