Efficient construction of secure hyperelliptic discrete logarithm problems

Hyperelliptic curves have been used to define discrete logarithm problems as cryptographic one-way functions. However, no efficient algorithm for construction of secure hyperelliptic curves is known until now. In this paper, efficient algorithms are presented to construct secure discrete logarithm problems on hyperelliptic curves whose Jacobian varieties are either simple or isogenous to a product of simple abelian varieties.

[1]  Alfred Menezes,et al.  Reducing elliptic curve logarithms to logarithms in a finite field , 1993, IEEE Trans. Inf. Theory.

[2]  Taira Honda,et al.  Isogeny classes of abelian varieties over finite fields , 1968 .

[3]  志村 五郎,et al.  Complex multiplication of Abelian varieties and its applications to number theory , 1961 .

[4]  Leonard M. Adleman,et al.  A subexponential algorithm for discrete logarithms over the rational subgroup of the jacobians of large genus hyperelliptic curves over finite fields , 1994, ANTS.

[5]  Kazuo Tanada,et al.  Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks , 1994, CRYPTO.

[6]  Kouichi Sakurai,et al.  Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems , 1991, CRYPTO.

[7]  Emil J. Volcheck Computing in the jacobian of a plane algebraic curve , 1994, ANTS.

[8]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[9]  Yu.I. Manin Complex multiplication of Abelian varieties and its application to number theory: G. Shimura and Y. Taniyama, Publications of the Mathematical Society of Japan, No. 6, Tokyo, 1961☆ , 1963 .

[10]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[11]  Alfred Menezes,et al.  Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.

[12]  J. Pila Frobenius maps of Abelian varieties and finding roots of unity in finite fields , 1990 .

[13]  Ming-Deh A. Huang,et al.  Primality Testing and Abelian Varieties over Finite Fields , 1992 .

[14]  J. Igusa,et al.  Arithmetic Variety of Moduli for Genus Two , 1960 .

[15]  R. Schoof Elliptic Curves Over Finite Fields and the Computation of Square Roots mod p , 1985 .

[16]  Ki-ichiro Hashimoto,et al.  Shimura curves as intersections of Humbert surfaces and defining equations of {QM}-curves of genus two , 1995 .

[17]  D. Cantor Computing in the Jacobian of a hyperelliptic curve , 1987 .

[18]  D. Mumford Tata Lectures on Theta I , 1982 .

[19]  Andreas Enge,et al.  Elliptic Curves and Their Applications to Cryptography , 1999, Springer US.

[20]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .