Presentation 2015-03-02
Analysis on isomorphism classes of elliptic curves subjected to GHS attack over prime degree extensions of finite fields with odd characteristic
Takayuki HOSOGAYA, Tsutomu IIJIMA, Mahoro SHIMURA, Jinhui CHAO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) The GHS attack is known to map the discrete logarithm problem (DLP) in the Jacobian of a curve C_0 defined over the d degree extension k_d of a finite field k to the DLP in the Jacobian of a new curve C over k which is a covering curve of C_0. Recently, classification of all elliptic curves possessing (2,...,2) covering C therefore subjected to the GHS attack is obtained in [27]. However, a such curve C_0 could be mapped by an k_d-isomorphism to another curve which also possesses a covering curve but with a different genus. In this paper, we present a detailed analysis on k_d-isomorphic classes of these curves. In particular, we show orbit-decomposition of them under action of PGL(2, k_d) in case of d = 2. Security against GHS attack of a curve C_0 is evaluated according to all possible genera g(C) among the curves belong to the PGL-orbit
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Elliptic Curve Cryptography / GHS attack
Paper # IT2014-76,ISEC2014-89,WBS2014-68
Date of Issue

Conference Information
Committee ISEC
Conference Date 2015/2/23(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Analysis on isomorphism classes of elliptic curves subjected to GHS attack over prime degree extensions of finite fields with odd characteristic
Sub Title (in English)
Keyword(1) Elliptic Curve Cryptography
Keyword(2) GHS attack
1st Author's Name Takayuki HOSOGAYA
1st Author's Affiliation Information and System Engineering Course, Graduate School of Science and Engineering Chuo University()
2nd Author's Name Tsutomu IIJIMA
2nd Author's Affiliation Koden Electronics Co., Ltd
3rd Author's Name Mahoro SHIMURA
3rd Author's Affiliation Department of Mathematical Sciences Tokai University
4th Author's Name Jinhui CHAO
4th Author's Affiliation Department of Information and System Engineering, Faculty of Science and Engineering Chuo University
Date 2015-03-02
Paper # IT2014-76,ISEC2014-89,WBS2014-68
Volume (vol) vol.114
Number (no) 471
Page pp.pp.-
#Pages 7
Date of Issue