Abstract
Following Ibukiyama, Katsura and Oort, all principally polarized superspecial abelian surfaces over 𝔽¯p can be represented by a certain type of 2×2 matrix g, having entries in the quaternion algebra Bp,∞. We present a heuristic polynomial-time algorithm which, upon input of two such matrices g1, g2, finds a “connecting matrix” representing a polarized isogeny of smooth degree between the corresponding surfaces. Our algorithm should be thought of as a two-dimensional analog of the KLPT algorithm from 2014 due to Kohel, Lauter, Petit and Tignol for finding a connecting ideal of smooth norm between two given maximal orders in Bp,∞.
The KLPT algorithm has proven to be a versatile tool in isogeny-based cryptography, and our analog has similar applications; we discuss two of them in detail. First, we show that it yields a polynomial-time solution to a two-dimensional analog of the so-called constructive Deuring correspondence: given a matrix g representing a superspecial principally polarized abelian surface, realize the latter as the Jacobian of a genus-2 curve (or, exceptionally, as the product of two elliptic curves if it concerns a product polarization). Second, we show that, modulo a plausible assumption, Charles–Goren–Lauter style hash functions from superspecial principally polarized abelian surfaces require a trusted set-up. Concretely, if the matrix g associated with the starting surface is known then collisions can be produced in polynomial time. We deem it plausible that all currently known methods for generating a starting surface indeed reveal the corresponding matrix. As an auxiliary tool, we present an efficient method for converting isogenies of powersmooth degree into the corresponding connecting matrix, a step for which a previous approach by Chu required super-polynomial (but sub-exponential) time.
| Original language | English |
|---|---|
| Title of host publication | Advances in Cryptology – CRYPTO 2025 |
| Subtitle of host publication | 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part I |
| Editors | Yael Tauman Kalai, Seny F. Kamara |
| Publisher | Springer |
| Pages | 167-200 |
| Number of pages | 34 |
| Edition | 1 |
| ISBN (Electronic) | 9783032018557 |
| ISBN (Print) | 9783032018540 |
| DOIs | |
| Publication status | Published - 17 Aug 2025 |
| Event | 45th Annual International Cryptology Conference, CRYPTO 2025 - Santa Barbara, United States Duration: 17 Aug 2025 → 21 Aug 2025 |
Publication series
| Name | Lecture Notes in Computer Science |
|---|---|
| Publisher | Springer |
| Volume | 16000 |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 45th Annual International Cryptology Conference, CRYPTO 2025 |
|---|---|
| Country/Territory | United States |
| City | Santa Barbara |
| Period | 17/08/25 → 21/08/25 |
Bibliographical note
Publisher Copyright:© International Association for Cryptologic Research 2025.
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science
Fingerprint
Dive into the research topics of 'KLPT2: Algebraic Pathfinding in Dimension Two and Applications'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver