An Algorithmic Approach to (2,2)-isogenies in the Theta Model and Applications to Isogeny-based Cryptography

Pierrick Dartois, Luciano Maino, Giacomo Pope, Damien Robert

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

Abstract

In this paper, we describe an algorithm to compute chains of (2,2)-isogenies between products of elliptic curves in the theta model. The description of the algorithm is split into various subroutines to allow for a precise field operation counting.

We present a constant time implementation of our algorithm in Rust and an alternative implementation in SageMath. Our work in SageMath runs ten times faster than a comparable implementation of an isogeny chain using the Richelot correspondence. The Rust implementation runs up to forty times faster than the equivalent isogeny in SageMath and has been designed to be portable for future research in higher-dimensional isogeny-based cryptography.
Original languageEnglish
Title of host publicationAdvances in Cryptology – ASIACRYPT 2024
Subtitle of host publication30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings, Part III
EditorsKai-Min Chung, Yu Sasaki
PublisherSpringer, Singapore
Pages304-338
Number of pages35
ISBN (Electronic)9789819608911
ISBN (Print)9789819608904
DOIs
Publication statusPublished - 12 Dec 2024
EventASIACRYPT 2024: 30th International Conference on the Theory and Application of Cryptology and Information Security - Kolkata, India
Duration: 9 Dec 202413 Dec 2024
https://asiacrypt.iacr.org/2024/

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume15486
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceASIACRYPT 2024
Country/TerritoryIndia
CityKolkata
Period9/12/2413/12/24
Internet address

Bibliographical note

Publisher Copyright:
© 2025 International Association for Cryptologic Research.

Fingerprint

Dive into the research topics of 'An Algorithmic Approach to (2,2)-isogenies in the Theta Model and Applications to Isogeny-based Cryptography'. Together they form a unique fingerprint.

Cite this