Description
Groups of prime order with a bilinear structure are interesting objects for public key cryptography. In the first part of the lecture we shall explain how the pairing on points of the Jacobian variety which is usually called "Tate-pairing" can be got in a p- adic setting by the Lichtenbaum pairing. On the one hand side this setting gives us more freedom for its computation which leads to more efficiency if the genus of the underlying curve is larger than 1.<br/> On the other side it shows that the Brauer groups of local fields arises in a natural way in the world of discrete logarithms based on ideal class groups. This, and the great importance of Brauer groups for number theory, motivates that one should try to investigate them computationally. In the second part of the lecture we shall present index-calculus methods for Brauer groups with applications to the classical discrete logarithm and to the computation of Euler's totient function.
Next sessions
-
Verification of Rust Cryptographic Implementations with Aeneas
Speaker : Aymeric Fromherz - Inria
From secure communications to online banking, cryptography is the cornerstone of most modern secure applications. Unfortunately, cryptographic design and implementation is notoriously error-prone, with a long history of design flaws, implementation bugs, and high-profile attacks. To address this issue, several projects proposed the use of formal verification techniques to statically ensure the[…] -
On the average hardness of SIVP for module lattices of fixed rank
Speaker : Radu Toma - Sorbonne Université
In joint work with Koen de Boer, Aurel Page, and Benjamin Wesolowski, we study the hardness of the approximate Shortest Independent Vectors Problem (SIVP) for random module lattices. We use here a natural notion of randomness as defined originally by Siegel through Haar measures. By proving a reduction, we show it is essentially as hard as the problem for arbitrary instances. While this was[…] -
Endomorphisms via Splittings
Speaker : Min-Yi Shen - No Affiliation
One of the fundamental hardness assumptions underlying isogeny-based cryptography is the problem of finding a non-trivial endomorphism of a given supersingular elliptic curve. In this talk, we show that the problem is related to the problem of finding a splitting of a principally polarised superspecial abelian surface. In particular, we provide formal security reductions and a proof-of-concept[…]-
Cryptography
-