Evidence that XTR is more secure than supersingular elliptic curve cryptosystems (Q1772226)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Evidence that XTR is more secure than supersingular elliptic curve cryptosystems |
scientific article |
Statements
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems (English)
0 references
15 April 2005
0 references
The well-known MOV algorithm [\textit{A. J. Menezes, T. Okamoto} and \textit{S. A. Vanstone}, IEEE Trans. Inf. Theory 39, No.~5, 1639--1646 (1993; Zbl 0801.94011)] allows to translate the Discrete Logarithm Problem (DLP) in a supersingular elliptic curve defined over GF\((q)\) to the DLP in a subgroup of the multiplicative group GF\((q^r)^*\), for some \(r\leq 6\). The XTR public key cryptosystems [\textit{A. K. Lenstra, E. R. Verheul}, CRYPTO 2000, Lect. Notes Comput. Sci. 1880, 1--19 (2000; Zbl 0995.94538)] work with the order \(p^2-p+1\) subgroup of GF\((p^6)^*\)\, (the XTR group), and the MOV algorithm provides an efficiently computable injective homomorphism of a (Class Three) supersingular elliptic curve over GF\((p^2)\), that the paper calls CTR curve, onto the XTR group. A plausible hypothesis, posed by Vanstone and Menezes, is that the inverse of such homomorphism can also be efficiently computed (so the XTR cryptosystems would reduce in fact to elliptic cryptosystems). The present paper provides evidence for a negative answer to the above hypothesis, showing that under it several believed hard problems, as the Diffie-Hellman Problem (DHP) , could be solved in the XTR subgroup. In Section 2 the authors study the structure of CTP curves and introduce the so-called distortion maps on CTP curves. The main results are proved in Section 3 where, as a side result, is also proved that the DDHP (Decision Diffie-Hellman Problem) in the CTP elliptic supersingular curves is efficiently computable (while the DHP and DLP are believed to be hard problems). In Section 4 the authors discuss possible generalizations of their results and techniques to other cryptosystems and general (nonsupersingular) elliptic curves where distortion map exist and in Section 5 discuss some other cryptographic applications of the distortion maps. Section 6 is for conclusions.
0 references
XTR public key systems
0 references
Diffie-Hellman problems
0 references
Supersingular elliptic curves
0 references
Inverting MOV embedding
0 references