# American Institute of Mathematical Sciences

May  2007, 1(2): 197-221. doi: 10.3934/amc.2007.1.197

## Cryptographic protocols on real hyperelliptic curves

 1 Department of Computer Science, University of Calgary, 2500 University Drive NW, Calgary, Alberta, Canada T2N 1N4, Canada 2 Department of Mathematics and Statistics, University of Calgary, 2500 University Drive NW, Calgary, Alberta, Canada T2N 1N4, Canada 3 Department of Mathematics, University of Wyoming, 1000 E. University Avenue, Laramie, WY 82071-3036, United States

Received  September 2006 Revised  May 2007 Published  May 2007

We present public-key cryptographic protocols for key exchange, digital signatures, and encryption whose security is based on the presumed intractability of solving the principal ideal problem, or equivalently, the distance problem, in the real model of a hyperelliptic curve. Our protocols represent a significant improvement over existing protocols using real hyperelliptic curves. Theoretical analysis and numerical experiments indicate that they are comparable to the imaginary model in terms of efficiency, and hold much more promise for practical applications than previously believed.
Citation: M. J. Jacobson, R. Scheidler, A. Stein. Cryptographic protocols on real hyperelliptic curves. Advances in Mathematics of Communications, 2007, 1 (2) : 197-221. doi: 10.3934/amc.2007.1.197
 [1] Diego F. Aranha, Ricardo Dahab, Julio López, Leonardo B. Oliveira. Efficient implementation of elliptic curve cryptography in wireless sensors. Advances in Mathematics of Communications, 2010, 4 (2) : 169-187. doi: 10.3934/amc.2010.4.169 [2] Michael J. Jacobson, Jr., Monireh Rezai Rad, Renate Scheidler. Comparison of scalar multiplication on real hyperelliptic curves. Advances in Mathematics of Communications, 2014, 8 (4) : 389-406. doi: 10.3934/amc.2014.8.389 [3] Roberto Avanzi, Michael J. Jacobson, Jr., Renate Scheidler. Efficient reduction of large divisors on hyperelliptic curves. Advances in Mathematics of Communications, 2010, 4 (2) : 261-279. doi: 10.3934/amc.2010.4.261 [4] Laurent Imbert, Michael J. Jacobson, Jr.. Empirical optimization of divisor arithmetic on hyperelliptic curves over $\mathbb{F}_{2^m}$. Advances in Mathematics of Communications, 2013, 7 (4) : 485-502. doi: 10.3934/amc.2013.7.485 [5] Florian Luca, Igor E. Shparlinski. On finite fields for pairing based cryptography. Advances in Mathematics of Communications, 2007, 1 (3) : 281-286. doi: 10.3934/amc.2007.1.281 [6] Roberto Avanzi, Nicolas Thériault. A filtering method for the hyperelliptic curve index calculus and its analysis. Advances in Mathematics of Communications, 2010, 4 (2) : 189-213. doi: 10.3934/amc.2010.4.189 [7] Stefan Erickson, Michael J. Jacobson, Jr., Andreas Stein. Explicit formulas for real hyperelliptic curves of genus 2 in affine representation. Advances in Mathematics of Communications, 2011, 5 (4) : 623-666. doi: 10.3934/amc.2011.5.623 [8] Gérard Maze, Chris Monico, Joachim Rosenthal. Public key cryptography based on semigroup actions. Advances in Mathematics of Communications, 2007, 1 (4) : 489-507. doi: 10.3934/amc.2007.1.489 [9] Santos González, Llorenç Huguet, Consuelo Martínez, Hugo Villafañe. Discrete logarithm like problems and linear recurring sequences. Advances in Mathematics of Communications, 2013, 7 (2) : 187-195. doi: 10.3934/amc.2013.7.187 [10] Javier de la Cruz, Ricardo Villanueva-Polanco. Public key cryptography based on twisted dihedral group algebras. Advances in Mathematics of Communications, 2022  doi: 10.3934/amc.2022031 [11] J. Alberto Conejero, Enrique Hernández-Orallo, Pietro Manzoni, Marina Murillo-Arcila. A SIR-based model for contact-based messaging applications supported by permanent infrastructure. Discrete and Continuous Dynamical Systems - S, 2019, 12 (4&5) : 735-746. doi: 10.3934/dcdss.2019048 [12] Chun-Xiang Guo, Guo Qiang, Jin Mao-Zhu, Zhihan Lv. Dynamic systems based on preference graph and distance. Discrete and Continuous Dynamical Systems - S, 2015, 8 (6) : 1139-1154. doi: 10.3934/dcdss.2015.8.1139 [13] Cécilia Tarpau, Javier Cebeiro, Geneviève Rollet, Maï K. Nguyen, Laurent Dumas. Analytical reconstruction formula with efficient implementation for a modality of Compton scattering tomography with translational geometry. Inverse Problems and Imaging, , () : -. doi: 10.3934/ipi.2021075 [14] Zhiguo Xu, Weizhu Bao, Shaoyun Shi. Quantized vortex dynamics and interaction patterns in superconductivity based on the reduced dynamical law. Discrete and Continuous Dynamical Systems - B, 2018, 23 (6) : 2265-2297. doi: 10.3934/dcdsb.2018096 [15] Yan Cui, Yanfei Wang. Velocity modeling based on Rayleigh wave dispersion curve and sparse optimization inversion. Inverse Problems and Imaging, 2021, 15 (5) : 1121-1134. doi: 10.3934/ipi.2021031 [16] Ramprasad Sarkar, Mriganka Mandal, Sourav Mukhopadhyay. Quantum-safe identity-based broadcast encryption with provable security from multivariate cryptography. Advances in Mathematics of Communications, 2022  doi: 10.3934/amc.2022026 [17] Madhurima Mukhopadhyay, Palash Sarkar, Shashank Singh, Emmanuel Thomé. New discrete logarithm computation for the medium prime case using the function field sieve. Advances in Mathematics of Communications, 2020  doi: 10.3934/amc.2020119 [18] Leah Anderson, Thomas Pumir, Dimitrios Triantafyllos, Alexandre M. Bayen. Stability and implementation of a cycle-based max pressure controller for signalized traffic networks. Networks and Heterogeneous Media, 2018, 13 (2) : 241-260. doi: 10.3934/nhm.2018011 [19] Mehmet Duran Toksari, Emel Kizilkaya Aydogan, Berrin Atalay, Saziye Sari. Some scheduling problems with sum of logarithm processing times based learning effect and exponential past sequence dependent delivery times. Journal of Industrial and Management Optimization, 2022, 18 (3) : 1795-1807. doi: 10.3934/jimo.2021044 [20] Jitendra Kumar, Gurmeet Kaur, Evangelos Tsotsas. An accurate and efficient discrete formulation of aggregation population balance equation. Kinetic and Related Models, 2016, 9 (2) : 373-391. doi: 10.3934/krm.2016.9.373

2020 Impact Factor: 0.935