On the Discrete Logarithm Problem for elliptic curves over local fields

AI-generated keywords: Discrete Logarithm Problem

AI-generated Key Points

  • The Discrete Logarithm Problem (DLP) for elliptic curves is a fundamental problem in cryptography
  • The paper presents a novel attack on the DLP for elliptic curves by exploiting its connection to the problem of lifting
  • The attack utilizes the exponential map and its inverse over Z/p^kZ, where p is a prime number and k is an integer
  • Hyperelliptic curves are resistant to the presented attack, offering a higher level of security compared to classic elliptic curves
  • Elliptic Curve Cryptography (ECC) has gained popularity due to its security and efficiency properties in resource-constrained devices
  • ECC relies on the difficulty of solving the ECDLP, which involves finding the discrete logarithm of a point on an elliptic curve with respect to a base point
  • This research contributes to understanding and improving the security of ECC by presenting a new attack based on lifting techniques
  • Hyperelliptic curves have potential benefits for enhanced cryptographic security.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Giuseppe Filippone

11 pages, 1 table, 20 references
License: CC BY-NC-SA 4.0

Abstract: The Discrete Logarithm Problem (DLP) for elliptic curves has been extensively studied since, for instance, it is the core of the security of cryptosystems like Elliptic Curve Cryptography (ECC). In this paper, we present an attack to the DLP for elliptic curves based on its connection to the problem of lifting, by using the exponential map for elliptic curves and its inverse over $ \mathbb{Z} / p^k \mathbb{Z} $. Additionally, we show that hyperelliptic curves are resistant to this attack, meaning that these latter curves offer a higher level of security compared to the classic elliptic curves used in cryptography.

Submitted to arXiv on 27 Apr. 2023

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2304.14150v1

The Discrete Logarithm Problem (DLP) for elliptic curves is a fundamental problem in cryptography, particularly in the security of cryptosystems like Elliptic Curve Cryptography (ECC). In this paper, the author presents a novel attack on the DLP for elliptic curves by exploiting its connection to the problem of lifting. The attack utilizes the exponential map for elliptic curves and its inverse over Z/p^kZ, where p is a prime number and k is an integer. The author also investigates the resistance of hyperelliptic curves to this attack. Hyperelliptic curves are a generalization of elliptic curves and offer a higher level of security compared to classic elliptic curves used in cryptography. The study shows that hyperelliptic curves are resistant to the presented attack, further highlighting their potential as a more secure alternative. Elliptic Curve Cryptography (ECC) has gained popularity due to its security and efficiency properties, especially in resource-constrained devices such as smart cards and mobile phones. The security of ECC relies on the difficulty of solving the ECDLP, which involves finding the discrete logarithm of a point on an elliptic curve with respect to a base point. By presenting this new attack based on lifting techniques, this paper contributes to understanding and improving the security of ECC. Overall, this research provides valuable insights into the DLP for elliptic curves and highlights the potential benefits of using hyperelliptic curves for enhanced cryptographic security.
Created on 07 Dec. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.