An Authenticated Key Agreement Protocol Using Isogenies Between Elliptic Curves


  • Debiao He Wuhan University School of Mathematics and Statistics Wuhan, Hubei, 430072, China
  • Jianhua Chen Wuhan University School of Mathematics and Statistics Wuhan, Hubei, 430072, China
  • Jin Hu School of Mathematics and Statistics Wuhan, Hubei, 430072, China


public-key cryptosystem, quantum computer, isogeny, elliptic curve, key agreement protocol


All the current public-key cryptosystems will become insecure when size of a quantum register is sufficient. An authenticated key agreement protocol, which is against the attack of quantum computer, is proposed. The proposed protocol can provide the security properties known session key security, forward security, resistance to key-compromise impersonation attack and to unknown key-share attack, key control. We also prove its security in a widely accepted model.


W. Diffie and M. Hellman, New directions in cryptography, IEEE Trans. Info. TH, vol. 22, pp.644-654, 1976.

Boneh D., Lipton R. Quantum cryptanalysis of hidden linear functions. Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology (LNCS 963), 1995:424-437.

Rostovtesv A. and Stolbunov A., Public-key cryptosystem based on isogenies. Cryptology ePrint Archive, Report 2006/145, 2006.

Couveignes J. M., Dewaghe L., Morain F. Isogeny cycles and the schoof-elkies-atkin algorithm. Ecole polytechnique, France, 1996.

Elkies N., Elliptic and modular curves over finite fields and related computational issues, Proceedings of a Conference in Honor of A.O.L. Atkin, AMS International Press, 1998, pp.21- 76.

Muller V., Ein Algorithmus zur Bestimmung der Punktanzahl elliptisher Kurven uber endlichen Korpern der Charakteristik groser drei, 1995. http://www.informatik.tudarmstadt. de/ti/forschung/ecc.

F.Morain, E.Schost, Fast Algorithms for Computing Isogenies between Elliptic Curves. morain/jcomp.pdf, 2006.

S. Galbraith. Constructing isogenies between elliptic curves over finite fields, Journal of Computational Mathematics, vol. 2, pp.118-138, 1999.

S. Blake-Wilson, D. Johnson and A. Menezes, Key Agreement Protocols and Their Security Analysis, Proceedings of Sixth IMA International Conference on Cryptography and Coding, Cirencester, UK, 1997, pp. 30-45.

H. Pan, J.-F. Li, Q.-S. Zheng, A Provable-Security Mutual Authenticated Key Agreement Protocol for Mobile Communication, The 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008, pp.1-4.



Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.