An edition of Endomorphism Rings in Cryptography (2011)

Endomorphism Rings in Cryptography

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

Buy this book

Last edited anonymously
July 21, 2011 | History
An edition of Endomorphism Rings in Cryptography (2011)

Endomorphism Rings in Cryptography

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

Modern communications heavily rely on cryptography to ensure data integrity and privacy. Over the past two decades, very efficient, secure, and featureful cryptographic schemes have been built on top of abelian varieties defined over finite fields. This thesis contributes to several computational aspects of ordinary abelian varieties related to their endomorphism ring structure.

This structure plays a crucial role in the construction of abelian varieties with desirable properties. For instance, pairings have recently enabled many advanced cryptographic primitives; generating abelian varieties endowed with efficient pairings requires selecting suitable endomorphism rings, and we show that more such rings can be used than expected.

We also address the inverse problem, that of computing the endomorphism ring of a prescribed abelian variety, which has several applications of its own. Prior state-of-the-art methods could only solve this problem in exponential time, and we design several algorithms of subexponential complexity for solving it in the ordinary case.

For elliptic curves, our algorithms are very effective and we demonstrate their practicality by solving large problems that were previously intractable. Additionally, we rigorously bound the complexity of our main algorithm assuming solely the extended Riemann hypothesis. As an alternative to one of our subroutines, we also consider a generalization of the subset sum problem in finite groups, and show how it can be solved using little memory.

Finally, we generalize our method to higher-dimensional abelian varieties, for which we rely on further heuristic assumptions. Practically speaking, we develop a library enabling the computation of isogenies between abelian varieties; using this important building block in our main algorithm, we apply our generalized method to compute several illustrative and record examples.

Publish Date
Pages
205

Buy this book

Edition Availability
Cover of: Endomorphism Rings in Cryptography
Endomorphism Rings in Cryptography
2011, Technische Universiteit Eindhoven
Paperback

Add another edition?

Book Details


Table of Contents

Part One. Abelian Varieties in Cryptography Page 1
Chapter One. Panorama of Cryptography Page 3
Chapter Two. Abelian Varieties Page 25
Chapter Three. Complex Multiplication Page 45
Chapter Four. Pairing-Friendly Varieties Page 65
Part Two. Computation of Endomorphism Rings Page 85
Chapter Five. Exponential Methods Page 87
Chapter Six. Subexponential Method Page 109
Chapter Seven. Complexity Analysis Page 133
Chapter Eight. Polarized Method Page 157

Edition Notes

Published in
Eindhoven, The Netherlands
Copyright Date
2011

The Physical Object

Format
Paperback
Pagination
ix, 186
Number of pages
205
Dimensions
24.5 x 17.0 x 1.3 centimeters

ID Numbers

Open Library
OL24792554M
ISBN 10
9038625197
uri
http://repository.tue.nl/714676

Links outside Open Library

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
July 21, 2011 Edited by 131.107.160.135 Edited without comment.
July 21, 2011 Edited by 131.107.160.135 Edited without comment.
July 21, 2011 Edited by 131.107.160.80 Edited without comment.
July 21, 2011 Edited by 131.107.160.80 Edited without comment.
July 21, 2011 Created by 131.107.160.184 Added new book.