Isogeny-Based Cryptography: A Promising Post-Quantum Technique

Cong Peng, Jianhua Chen, Sherali Zeadally, Debiao He

Research output: Contribution to journalArticlepeer-review

9 Scopus citations

Abstract

Recent advances in quantum computing have made existing public key cryptosystems vulnerable to enormous security threats. Therefore, numerous efforts have been exploring post-quantum cryptographic techniques to address the emergence of quantum computing. We focus on one promising post-quantum cryptography known as isogeny-based cryptography, first by reviewing some concepts of the elliptic curve isogeny, and then, we present three major methods for constructing isogeny-based difficult problems. Then, we present some existing isogeny-based cryptographic primitives, such as signature and key exchange, and analyze their advantages and disadvantages. Finally, we discuss a few major challenges of isogeny research that, we hope, will attract more attention to isogeny-based cryptography.

Original languageEnglish
Article number8896171
Pages (from-to)27-32
Number of pages6
JournalIT Professional
Volume21
Issue number6
DOIs
StatePublished - Nov 1 2019

Bibliographical note

Publisher Copyright:
© 1999-2012 IEEE.

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Isogeny-Based Cryptography: A Promising Post-Quantum Technique'. Together they form a unique fingerprint.

Cite this