Disguising tori and elliptic curves.

IACR Cryptology ePrint Archive(2006)

引用 25|浏览10
暂无评分
摘要
Frey proposed the idea of 'disguising' an elliptic curve. This is a method to obtain a 'black box' representation of a group. We adapt this notion to finite fields and tori and study the question of whether such systems are secure. Our main result is an algebraic attack which shows that it is not secure to disguise the torus T2. We also show that some methods for disguising an elliptic curve are not secure. Finally, we present a method to disguise an elliptic curve which seems to resist our algebraic attack.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要