This note was written in 1997 after a talk I gave at the seminaire de complexite et cryptographie at the ´ Ecole Normale Superieure After it was rejected at crypto97 I forgot it until a few colleagues of mine informed me that it could be of some interest to some researchers in the field of algorithmic and cryptography. Although I am not quite happy with the redaction of this note, I believe it is more fair not to improve nor correct it yet. So I leave it in its original state, including misprints. I just added this introductory paragraph. If need be, I will publish an updated version later. We introduce the notion of hard homogeneous space (HHS) and briefly develop the corresponding theory. We show that cryptographic protocols based on the discrete logarithm problem have a counterpart for any hard homogeneous space. Indeed, the notion of hard homogeneous space is a more general and more natural context for these protocols. We exhibit conjectural hard homogeneous spaces independant from any discrete log- arithm problem. They are based on complex multiplication theory. This shows the existence of schemes for authentication and key exchange that do not rely on the difficulty of computing dicrete logarithm inany finite group nor factoring integers. We show that the concept of HHS fits with class field theory to provide a unified theory for the already used discrete logarithm problems (on multiplicative groups of finite fields or rational points on elliptic curves) and the HHS we present here. We discuss a few algorithmic questions related to hard homogeneous spaces. The paper is looking for a wider point of view on the discrete logarithm problem both mathematically and cryptographically.
[1]
D. Pointcheval.
Les preuves de connaissance et leurs preuves de sécurité
,
1996
.
[2]
Amos Fiat,et al.
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
,
1986,
CRYPTO.
[3]
Henri Cohen,et al.
A course in computational algebraic number theory
,
1993,
Graduate texts in mathematics.
[4]
D. Kohel.
Endomorphism rings of elliptic curves over finite fields
,
1996
.
[5]
G. Shimura,et al.
Automorphic Functions and Number Theory
,
1968
.
[6]
Jr. H. W. Lenstra.
Complex Multiplication Structure of Elliptic Curves
,
1996
.
[7]
J. Buchmann.
On the computation of units and class numbers by a generalization of Lagrange's algorithm
,
1987
.
[8]
Silvio Micali,et al.
Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
,
1986,
27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[9]
E. Haacke.
Sequences
,
2005
.
[10]
K. McCurley,et al.
A rigorous subexponential algorithm for computation of class groups
,
1989
.
[11]
J. Silverman.
Advanced Topics in the Arithmetic of Elliptic Curves
,
1994
.
[12]
Reynald Lercier,et al.
Counting the Number of Points on Elliptic Curves over Finite Fields: Strategies and Performance
,
1995,
EUROCRYPT.