2014
DOI: 10.1112/s1461157014000151
|View full text |Cite
|
Sign up to set email alerts
|

On the quaternion -isogeny path problem

Abstract: Let O be a maximal order in a definite quaternion algebra over Q of prime discriminant p, and a small prime. We describe a probabilistic algorithm which, for a given left O-ideal, computes a representative in its left ideal class of -power norm. In practice the algorithm is efficient and, subject to heuristics on expected distributions of primes, runs in expected polynomial time. This solves the underlying problem for a quaternion analog of the Charles-Goren-Lauter hash function, and has security implications … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
131
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 76 publications
(135 citation statements)
references
References 8 publications
0
131
0
Order By: Relevance
“…The strategy is to compute a lattice I in B p,∞ of appropriate norm that is a left ideal of End(E) and a right ideal of End(E ), and to translate it back to the geometric setting to obtain an isogeny. This approach motivated the quaternion -isogeny algorithm of Kohel-Lauter-Petit-Tignol [17,33,37], which solves the following problem: Problem 7. Let p, be distinct prime numbers.…”
Section: Problemmentioning
confidence: 99%
See 2 more Smart Citations
“…The strategy is to compute a lattice I in B p,∞ of appropriate norm that is a left ideal of End(E) and a right ideal of End(E ), and to translate it back to the geometric setting to obtain an isogeny. This approach motivated the quaternion -isogeny algorithm of Kohel-Lauter-Petit-Tignol [17,33,37], which solves the following problem: Problem 7. Let p, be distinct prime numbers.…”
Section: Problemmentioning
confidence: 99%
“…All assumptions except for the second one come from our use of (the powersmooth variant of) the quaternion isogeny algorithm in [33].…”
Section: Heuristic Assumptions Used In This Papermentioning
confidence: 99%
See 1 more Smart Citation
“…There are currently no subexponential classical or quantum attacks for these systems. However, under some heuristic assumptions, the quaternion analogue for the underlying hardness assumption of the hash function in [CGL09] was broken in [KLPT14], which suggests that a careful study of the isogenies and endomorphism rings of supersingular elliptic curves is necessary.…”
Section: Introductionmentioning
confidence: 99%
“…Given an order O in a quaternion algebra, the -isogeny path in O was recently shown to be easy [13]. Therefore, the computation of the endomorphism ring of a supersingular curve is very important for isogeny computation.…”
Section: Conclusion and Further Perspectivesmentioning
confidence: 99%