well thanks for reply :)
The key exchange does not rely on using two different points.

I will try to explain i little more general:
I generate my l-torsion subgroup by two points:
<P, Q> = E[l]
During Key exchange i define my kernel using linear combination of
random values:
m, n
kernel = [m] * P + [n] * Q

So i wondered why i need two points. To generate the torsion subgroup it
would suffice to use one point:
<P> = E[l]
And to generate the kernel the linear combination of one points would
suffice too:
kernel = [m] * P

So why is the protocol using zwo points for each? I that purely a
security issue to ensure that the torsion subgroup is no cyclic anymore?

regards,

On 07/09/2015 10:24 AM, coderman wrote:
> On 7/8/15, Marcel <tiep...@dev-nu11.de> wrote:
>> ...
>> So my question is, why do i need to random values m_A and n_A to compute
>> the torsiongroup E[l_A] and respectively the kernel K_A ?
>>
>> Why does is not suffice to use only 1 point to generate E[l_A] and
>> Kernel K_A ?
> it is late, and i may mis understand,
>
> yet the two are requisite for peers arriving at a shared secret by way
> of these constructed isogeny; and the random values necessary to not
> give too much (confirm secret values, without exposing secret values)
>
> i found this paper a helpful expansion on the subject:
>   http://cacr.uwaterloo.ca/techreports/2014/cacr2014-20.pdf
> "In this paper, we mainly explore the efficiency of implementing recently
> proposed isogeny-based post-quantum public key cryptography..."
>
> specifically the graph on page 5. note that the key exchange relies on
> finding a path connecting vertices in a graph of supersingular
> isogenies - thus a pair on both ends, not just a pair arrived at among
> both participants.
>
> if this is clear as mud, i will try tomorrow on a fresh brain :)
>
>
> best regards,

_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to