ELLIPTICAL CURVE CRYPTOGRAPHY AND POST-QUANTUM CRYPTOGRAPHIC MODEL BASED ON ISOGENY IN A QUANTUM COMPUTING ENVIRONMENT
- Authors
-
-
Muhamediyeva D. T.
Tashkent Institute of Irrigation and Agricultural Mechanization Engineers National Research University
Author
-
Tagayev F. A.
Tashkent Institute of Irrigation and Agricultural Mechanization Engineers National Research University
Author
-
- Keywords:
- Post-quantum cryptography, elliptic curve cryptography, SIKE, quantum computing, Qiskit, isogeny maps, quantum simulation, quantum schemes.
- Abstract
-
This paper studies the modeling of elliptic curve cryptography and isogeny-based algorithms in a quantum computing environment, which play an important role in the post-quantum cryptography paradigm. In the study, the operations of adding and doubling points on an elliptic curve are mathematically analyzed and implemented using the Python programming language. In addition, a quantum scheme based on the Qiskit platform was developed to simulate the quantum computing environment. The model describes a simplified view of the isogeny mapping process using quantum superposition and nonlinear transformations. The proposed model was tested on a local quantum simulator and the results were analyzed using a probability distribution. The results obtained demonstrate the possibility of modeling elliptic curve-based cryptographic algorithms in a quantum environment and provide an important theoretical basis for post-quantum cryptography research.
- References
-
1.Shor, P.W., 1997. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5), pp.1484–1509.
2.Bernstein, D.J., Lange, T., 2017. Post-quantum cryptography. Nature, 549(7671), pp.188–194.
3.Jao, D., De Feo, L., 2011. Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Post-Quantum Cryptography, pp.19–34.
4.De Feo, L., Jao, D., Plût, J., 2014. Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Journal of Mathematical Cryptology, 8(3), pp.209–247.
5.Childs, A.M., Van Dam, W., 2010. Quantum algorithms for algebraic problems. Reviews of Modern Physics, 82(1), pp.1–52.
6.Nielsen, M.A., Chuang, I.L., 2010. Quantum Computation and Quantum Information. Cambridge University Press.
7.Arute, F. et al., 2019. Quantum supremacy using a programmable superconducting processor. Nature, 574, pp.505–510.
8.Preskill, J., 2018. Quantum computing in the NISQ era and beyond. Quantum, 2, 79.
- Downloads
- Published
- 2026-03-30
- Issue
- Vol. 2 No. 3 (2026)
- Section
- Articles
- License
-

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
Most read articles by the same author(s)
- Muhamediyeva D. T., Mamatov A. A., COMPARATIVE ANALYSIS OF THE EFFICIENCY OF CLASSIC MACHINE LEARNING MODELS USING DISTILBERT-BASED TEXT VECTORIZATION METHODS , Eureka Journal of Computing Science & Digital Innovation: Vol. 2 No. 3 (2026)
Similar Articles
- Akhmadullayeva Mubina Khamidullo qizi, ASSESSING THE IMPACT OF MOBILE-ASSISTED LANGUAGE LEARNING (MALL) APPS ON VOCABULARY ACQUISITION , Eureka Journal of Computing Science & Digital Innovation: Vol. 2 No. 2 (2026)
- Mirzakamolova Maftuna Rahimjon qizi, THE EFFECTIVENESS OF ASSOCIATIVE TEACHING IN ENHANCING LEARNERS’ COGNITIVE AND LINGUISTIC SKILLS , Eureka Journal of Computing Science & Digital Innovation: Vol. 2 No. 1 (2026)
- Adhamjon Mamajonov, USING DIGITAL TOOLS AND ONLINE PLATFORMS FOR TEACHING COMPUTER SKILLS IN TECHNICAL COLLEGES , Eureka Journal of Computing Science & Digital Innovation: Vol. 2 No. 1 (2026)
You may also start an advanced similarity search for this article.








