An Authenticated Key Agreement Protocol Using Isogenies Between Elliptic Curves
AbstractAll the current public-key cryptosystems will become insecure when size of a quantum register is sufficient. An authenticated key agreement protocol, which is against the attack of quantum computer, is proposed. The proposed protocol can provide the security properties known session key security, forward security, resistance to key-compromise impersonation attack and to unknown key-share attack, key control. We also prove its security in a widely accepted model.
 Boneh D., Lipton R. Quantum cryptanalysis of hidden linear functions. Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology (LNCS 963), 1995:424-437.
 Rostovtesv A. and Stolbunov A., Public-key cryptosystem based on isogenies. Cryptology ePrint Archive, Report 2006/145, 2006. http://eprint.iacr.org/.
 Couveignes J. M., Dewaghe L., Morain F. Isogeny cycles and the schoof-elkies-atkin algorithm. Ecole polytechnique, France, 1996.
 Elkies N., Elliptic and modular curves over finite fields and related computational issues, Proceedings of a Conference in Honor of A.O.L. Atkin, AMS International Press, 1998, pp.21- 76.
 Muller V., Ein Algorithmus zur Bestimmung der Punktanzahl elliptisher Kurven uber endlichen Korpern der Charakteristik groser drei, 1995. http://www.informatik.tudarmstadt. de/ti/forschung/ecc.
 F.Morain, E.Schost, Fast Algorithms for Computing Isogenies between Elliptic Curves. http://www.lix.polytechnique.fr/ morain/jcomp.pdf, 2006.
 S. Galbraith. Constructing isogenies between elliptic curves over finite fields, Journal of Computational Mathematics, vol. 2, pp.118-138, 1999.
 S. Blake-Wilson, D. Johnson and A. Menezes, Key Agreement Protocols and Their Security Analysis, Proceedings of Sixth IMA International Conference on Cryptography and Coding, Cirencester, UK, 1997, pp. 30-45.
 H. Pan, J.-F. Li, Q.-S. Zheng, A Provable-Security Mutual Authenticated Key Agreement Protocol for Mobile Communication, The 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008, pp.1-4.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.