Skip to main content

Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves

Author(s): Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; et al

Download
To refer to this page use: http://arks.princeton.edu/ark:/88435/pr1qg1p
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBoneh, Dan-
dc.contributor.authorGlass, Darren-
dc.contributor.authorKrashen, Daniel-
dc.contributor.authorLauter, Kristin-
dc.contributor.authorSharif, Shahed-
dc.contributor.authorSilverberg, Alice-
dc.contributor.authorTibouchi, Mehdi-
dc.contributor.authorZhandry, Mark-
dc.date.accessioned2021-10-08T19:48:14Z-
dc.date.available2021-10-08T19:48:14Z-
dc.date.issued2020en_US
dc.identifier.citationBoneh, Dan, Darren Glass, Daniel Krashen, Kristin Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, and Mark Zhandry. "Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves." Journal of Mathematical Cryptology 14, no. 1 (2020): 5-14. doi:10.1515/jmc-2015-0047en_US
dc.identifier.issn1862-2976-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/pr1qg1p-
dc.description.abstractWe describe a framework for constructing an efficient non-interactive key exchange (NIKE) protocol for n parties for any n ≥ 2. Our approach is based on the problem of computing isogenies between isogenous elliptic curves, which is believed to be difficult. We do not obtain a working protocol because of a missing step that is currently an open mathematical problem. What we need to complete our protocol is an efficient algorithm that takes as input an abelian variety presented as a product of isogenous elliptic curves, and outputs an isomorphism invariant of the abelian variety. Our framework builds a cryptographic invariant map, which is a new primitive closely related to a cryptographic multilinear map, but whose range does not necessarily have a group structure. Nevertheless, we show that a cryptographic invariant map can be used to build several cryptographic primitives, including NIKE, that were previously constructed from multilinear maps and indistinguishability obfuscation.en_US
dc.format.extent5 - 14en_US
dc.language.isoen_USen_US
dc.relation.ispartofJournal of Mathematical Cryptologyen_US
dc.rightsFinal published version. This is an open access article.en_US
dc.titleMultiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curvesen_US
dc.typeJournal Articleen_US
dc.identifier.doi10.1515/jmc-2015-0047-
dc.identifier.eissn1862-2984-
pu.type.symplectichttp://www.symplectic.co.uk/publications/atom-terms/1.0/journal-articleen_US

Files in This Item:
File Description SizeFormat 
MultipartyNonInteractiveKeyExchange.pdf444.77 kBAdobe PDFView/Download


Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.