Paper 2018/307

Isolated Curves and the MOV Attack

Travis Scholl

Abstract

We present a variation on the CM method that produces elliptic curves over prime fields with nearly prime order that do not admit many efficiently computable isogenies. Assuming the Bateman-Horn conjecture, we prove that elliptic curves produced this way almost always have a large embedding degree, and thus are resistant to the MOV attack on the ECDLP.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Journal of Mathematical Cryptography
DOI
10.1515/jmc-2016-0053
Keywords
elliptic curve cryptosystemnumber theory
Contact author(s)
tscholl2 @ uw edu
History
2018-04-03: received
Short URL
https://ia.cr/2018/307
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/307,
      author = {Travis Scholl},
      title = {Isolated Curves and the MOV Attack},
      howpublished = {Cryptology ePrint Archive, Paper 2018/307},
      year = {2018},
      doi = {10.1515/jmc-2016-0053},
      note = {\url{https://eprint.iacr.org/2018/307}},
      url = {https://eprint.iacr.org/2018/307}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.