337
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography

ORCID Icon
 

ABSTRACT

We call a simple abelian variety over Fp super-isolated if its (Fp-rational) isogeny class contains no other varieties. The motivation for considering these varieties comes from concerns about isogeny-based attacks on the discrete log problem. We heuristically estimate that the number of super-isolated elliptic curves over Fp with prime order and pN is roughly Θ˜(N). In contrast, we prove that there are only two super-isolated surfaces of cryptographic size and near-prime order.

2010 AMS SUBJECT CLASSIFICATION:

Acknowledgments

I would like to thank my advisor Neal Koblitz for all of his inspiration and guidance while working on this paper. I would also like to acknowledge the support from my graduate student peers, for which I am especially grateful.

Notes

3 In this paper, we use simple to mean simple over the base field. Other sources sometimes use the term to mean simple over the algebraic closure.

4 The statement of [CitationWaterhouse 69, Thm. 3.5] refers to an order in EndFpAQ, but this is the same as K since the base field is prime, see [CitationWaterhouse 69, Ch. 2].

5 Cryptosystems usually use jacobians of hyperelliptic curves rather than arbitrary varieties because they provide efficient representations necessary for practical use [CitationKoblitz 89].

6 There are a total of eight choices of signs we could use to define A. These come from the three choices of signs: one in equation (Equation3–5), one in equation (Equation3–6), and one from the quadratic formula when solving equation (Equation3–5) for x3. Every solution to equations (Equation3–5)–(Equation3–7) lies in one of these eight sets.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.