Isogeny-Based Cryptography: A Promising Post-Quantum Technique

Cong Peng, Jianhua Chen, Sherali Zeadally, Debiao He

Research output: Contribution to journalArticlepeer-review

5 Scopus citations

Abstract

Recent advances in quantum computing have made existing public key cryptosystems vulnerable to enormous security threats. Therefore, numerous efforts have been exploring post-quantum cryptographic techniques to address the emergence of quantum computing. We focus on one promising post-quantum cryptography known as isogeny-based cryptography, first by reviewing some concepts of the elliptic curve isogeny, and then, we present three major methods for constructing isogeny-based difficult problems. Then, we present some existing isogeny-based cryptographic primitives, such as signature and key exchange, and analyze their advantages and disadvantages. Finally, we discuss a few major challenges of isogeny research that, we hope, will attract more attention to isogeny-based cryptography.

Original languageEnglish
Article number8896171
Pages (from-to)27-32
Number of pages6
JournalIT Professional
Volume21
Issue number6
DOIs
StatePublished - Nov 1 2019

Bibliographical note

Funding Information:
This work was supported in part by the National Natural Science Foundation of China (Nos. 61972294, 61932016) and in part by the Opening Project of Guangdong Provincial Key Laboratory of Data Security and Privacy Protection (No. 2017B030301004-11).

Publisher Copyright:
© 1999-2012 IEEE.

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Isogeny-Based Cryptography: A Promising Post-Quantum Technique'. Together they form a unique fingerprint.

Cite this