CryptoDB
Marzio Mula
ORCID: 0000-0002-5953-8724
Publications and invited talks
Year
Venue
Title
2025
CRYPTO
More Efficient Isogeny Proofs of Knowledge via Canonical Modular Polynomials
Abstract
Proving knowledge of a secret isogeny has recently been proposed as a means to generate supersingular elliptic curves of unknown endomorphism ring, but is equally important for cryptographic protocol design as well as for real world deployments. Recently, Cong, Lai and Levin (ACNS'23) have investigated the use of general-purpose (non-interactive) zero-knowledge proof systems for proving the knowledge of an isogeny of degree $2^k$ between supersingular elliptic curves. In particular, their approach is to model this relation via a sequence of $k$ successive steps of a walk in the supersingular isogeny graph and to show that the respective $j$-invariants are roots of the second modular polynomial. They then arithmetize this relation and show that this approach, when compared to state-of-the-art tailor-made proofs of knowledge by Basso et al. (EUROCRYPT'23), gives a 3-10$\times$ improvement in proof and verification times, with comparable proof sizes.
In this paper we ask whether we can further improve the modular polynomial-based approach and generalize its application to primes ${\ell>2}$, as used in some recent isogeny-based constructions. We will answer these questions affirmatively, by designing efficient arithmetizations for each ${\ell \in \{2, 3, 5, 7, 13\}}$ that achieve an improvement over Cong, Lai and Levin of up to 48\%.
Our main technical tool and source of efficiency gains is to switch from classical modular polynomials to canonical modular polynomials. Adapting the well-known results on the former to the latter polynomials, however, is not straight-forward and requires some technical effort. We prove various interesting connections via novel use of resultant theory, and advance the understanding of canonical modular polynomials, which might be of independent interest.
2025
ASIACRYPT
Qlapoti: Simple and Efficient Translation of Quaternion Ideals to Isogenies
Abstract
The main building block in isogeny-based cryptography is an algorithmic
version of the Deuring correspondence, called IdealToIsogeny. This algorithm
takes as input left ideals of the endomorphism ring of a supersingular elliptic
curve and computes the associated isogeny. Building on ideas from QFESTA, the
Clapoti framework by Page and Robert reduces this problem to solving a certain
norm equation. The current state of the art is however unable to efficiently
solve this equation, and resorts to a relaxed version of it instead. This
impacts not only the efficiency of the IdealToIsogeny procedure, but also its
success probability. The latter issue has to be mitigated with complex and
memory-heavy rerandomization procedures, but still leaves a
gap between the security analysis and the actual implementation of
cryptographic schemes employing IdealToIsogeny as a subroutine.
For instance, in SQIsign the failure probability is still $2^{-60}$ which
is not cryptographically negligible.
The main contribution of this paper is a very simple and efficient algorithm
called Qlapoti which approaches the norm equation from Clapoti directly,
solving all the aforementioned problems at once. First, it makes the
IdealToIsogeny subroutine between 2.2 and 2.6 times faster. This
signigicantly improves the speed of schemes using this subroutine, including
notably SQIsign and PRISM. On top of that, Qlapoti has a cryptographically
negligible failure probability. This eliminates the need for rerandomization,
drastically reducing memory consumption, and allows for cleaner security
reductions.
2025
ASIACRYPT
Tanuki: New Frameworks for (Concurrently Secure) Blind Signatures from Post-Quantum Groups Actions
Abstract
Blind signatures are fundamental cryptographic primitives enabling privacy-preserving authentication and have seen renewed interest in the post-quantum literature.
Existing efficient constructions predominantly rely on Fischlin’s generic paradigm instantiated over lattice assumptions, while blinding techniques for $\Sigma$-protocol-based blind signatures remain sparse beyond lattices. Moreover, achieving provable concurrent security under polynomially many sessions has been a longstanding open challenge for this approach in the post-quantum literature as evidenced by the recent attacks in EC’24 and PKC’24.
This work broadens the landscape of post-quantum blind signatures by introducing novel techniques and proposing four frameworks based on general cryptographic group actions, without requiring commutativity. Our constructions admit instantiations under diverse post-quantum assumptions, including CSIDH (isogeny-based), LESS (code-based, NIST round-two), and more. These frameworks offer flexible trade-offs in assumptions (from interactive one-more to the standard inversion problem) and key/signature sizes, and culminate in a construction that achieves security under polynomially many concurrent sessions. This enables the first efficient blind signatures from isogenies and codes with provable concurrent security with 4.5 and 64.7 KB respectively. We also outline several directions for optimization and further instantiations for future work.
2023
CRYPTO
Weak instances of class group action based cryptography via self-pairings
Abstract
In this paper we study non-trivial self-pairings with cyclic domains that are compatible with isogenies between elliptic curves oriented by an imaginary quadratic order $\mathcal{O}$. We prove that the order $m$ of such a self-pairing necessarily satisfies $m \mid \Delta_{\mathcal{O}}$ (and even $2m \mid \Delta_{\mathcal{O}} $ if $4 \mid \Delta_{\mathcal{O}}$ and $4m \mid \Delta_{\mathcal{O}}$ if $8 \mid \Delta_{\mathcal{O}}$) and is not a multiple of the field characteristic. Conversely, for each $m$ satisfying these necessary conditions, we construct a family of non-trivial cyclic self-pairings of order $m$ that are compatible with oriented isogenies, based on generalized Weil and Tate pairings.
As an application, we identify weak instances of class group actions on elliptic curves assuming the degree of the secret isogeny is known. More in detail, we show that if $m^2 \mid \Delta_{\mathcal{O}}$ for some prime power $m$ then given two primitively $\mathcal{O}$-oriented elliptic curves $(E, \iota)$ and $(E',\iota') = [\mathfrak{a}](E,\iota)$ connected by an unknown invertible ideal $\mathfrak{a} \subseteq \mathcal{O}$, we can recover $\mathfrak{a}$ essentially at the cost of a discrete logarithm computation in a group of order $m^2$, assuming the norm of $\mathfrak{a}$ is given and is smaller than $m^2$. We give concrete instances, involving ordinary elliptic curves over finite fields, where this turns into a polynomial time attack.
Finally, we show that these self-pairings simplify known results on the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves.
Coauthors
- Giacomo Borin (1)
- Wouter Castryck (1)
- Maria Corte-Real Santos (1)
- Thomas den Hollander (1)
- Jonathan Komada Eriksen (1)
- Lucjan Hanzlik (1)
- Marc Houben (1)
- Riccardo Invernizzi (1)
- Sören Kleine (1)
- Yi-Fu Lai (1)
- Sam van Buuren (1)
- Simon-Philipp Merz (1)
- Marzio Mula (4)
- Eugenio Paracucchi (1)
- Sina Schaeffler (1)
- Daniel Slamanig (2)
- Sebastian A. Spindler (1)
- Gang Tang (1)
- Frederik Vercauteren (2)