Journal of Mathematical Cryptology (Oct 2017)

Isolated elliptic curves and the MOV attack

  • Scholl Travis

DOI
https://doi.org/10.1515/jmc-2016-0053
Journal volume & issue
Vol. 11, no. 3
pp. 131 – 146

Abstract

Read online

We present a variation on the CM method that produces elliptic curves over prime fields with nearly prime order that do not admit many efficiently computable isogenies. Assuming the Bateman–Horn conjecture, we prove that elliptic curves produced this way almost always have a large embedding degree, and thus are resistant to the MOV attack on the ECDLP.

Keywords