Quantum Security Analysis of CSIDH - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2020

Quantum Security Analysis of CSIDH

Résumé

CSIDH is a recent proposal for post-quantum non-interactive key-exchange, presented at ASIACRYPT 2018. Based on supersingular elliptic curve isogenies, it is similar in design to a previous scheme by Couveignes, Rostovtsev and Stolbunov, but aims at an improved balance between efficiency and security. In the proposal, the authors suggest concrete parameters in order to meet some desired levels of quantum security. These parameters are based on the hardness of recovering a hidden isogeny between two elliptic curves, using a quantum subexponential algorithm of Childs, Jao and Soukharev. This algorithm combines two building blocks: first, a quantum algorithm for recovering a hidden shift in a commutative group. Second, a computation in superposition of all isogenies originating from a given curve, which the algorithm calls as a black box. In this paper, we give a comprehensive security analysis of CSIDH. Our first step is to revisit three quantum algorithms for the abelian hidden shift problem from the perspective of non-asymptotic cost. There are many possible tradeoffs between the quantum and classical complexities of these algorithms and all of them should be taken into account by security levels. Second, we complete the non-asymptotic study of the black box in the hidden shift algorithm. This allows us to show that the parameters proposed by the authors of CSIDH do not meet their expected quantum security.
Fichier principal
Vignette du fichier
537.pdf (511.58 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-01896046 , version 1 (15-10-2018)
hal-01896046 , version 2 (08-12-2020)

Identifiants

Citer

Xavier Bonnetain, André Schrottenloher. Quantum Security Analysis of CSIDH. EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2020, Zagreb / Virtual, Croatia. pp.493--522, ⟨10.1007/978-3-030-45724-2_17⟩. ⟨hal-01896046v2⟩

Collections

INRIA INRIA2
248 Consultations
387 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More