Recent advances in quantum computing have made existing public key cryptosystems vulnerable to enormous security threats. Therefore, numerous efforts have been exploring post-quantum cryptographic techniques to address the emergence of quantum computing. We focus on one promising post-quantum cryptography known as isogeny-based cryptography, first by reviewing some concepts of the elliptic curve isogeny, and then, we present three major methods for constructing isogeny-based difficult problems. Then, we present some existing isogeny-based cryptographic primitives, such as signature and key exchange, and analyze their advantages and disadvantages. Finally, we discuss a few major challenges of isogeny research that, we hope, will attract more attention to isogeny-based cryptography.
|Number of pages||6|
|State||Published - Nov 1 2019|
Bibliographical noteFunding Information:
This work was supported in part by the National Natural Science Foundation of China (Nos. 61972294, 61932016) and in part by the Opening Project of Guangdong Provincial Key Laboratory of Data Security and Privacy Protection (No. 2017B030301004-11).
© 1999-2012 IEEE.
ASJC Scopus subject areas
- Hardware and Architecture
- Computer Science Applications