## An Advanced ECC ID-Based Remote Mutual Authentication Scheme for Mobile Devices

- Tien-Ho Chen, Yen-Chiu Chen, Wei-Kuan Shih
- 2010 7th International Conference on Ubiquitous…
- 2010

Highly Influenced

13 Excerpts

- Published 2005 in ASIACRYPT

The aim of this paper is to justify the common cryptographic practice of selecting elliptic curves using their order as the primary criterion. We can formalize this issue by asking whether the discrete log problem (dlog) has the same difficulty for all curves over a given finite field with the same order. We prove that this is essentially true by showing polynomial time random reducibility of dlog among such curves, assuming the Generalized Riemann Hypothesis (GRH). We do so by constructing certain expander graphs, similar to Ramanujan graphs, with elliptic curves as nodes and low degree isogenies as edges. The result is obtained from the rapid mixing of random walks on this graph. Our proof works only for curves with (nearly) the same endomorphism rings. Without this technical restriction such a dlog equivalence might be false; however, in practice the restriction may be moot, because all known polynomial time techniques for constructing equal order curves produce only curves with nearly equal endomorphism rings.

@inproceedings{Jao2005DoAE,
title={Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?},
author={David Jao and Stephen D. Miller and Ramarathnam Venkatesan},
booktitle={ASIACRYPT},
year={2005}
}