Hyperelliptic Isogeny Based Cryptography
Isogeny-based cryptography is one of the leading directions in post-quantum cryptography. It relies on isogenies—special morphisms between abelian varieties that preserve their algebraic structure. Early cryptosystems focused on elliptic curves, giving rise to well-known constructions such as SIDH and CSIDH. In recent years, however, attention has turned to higher-genus analogues, especially Jacobians of hyperelliptic curves of genus two and three, which provide richer moduli spaces, larger endomorphism rings, and new avenues for secure cryptographic protocols.
A particularly active area of research involves (n,n)-isogenies between Jacobians of genus-two curves. A Jacobian J(C) is said to be (n,n)-split if it is isogenous to a product of two elliptic curves via an isogeny of type (n,n). The moduli of such Jacobians form an irreducible, two-dimensional subvariety inside the moduli space of genus-two curves. Geometrically, this surface corresponds to a Humbert surface of discriminant n^2 in the Siegel modular threefold—one of the most classical and beautiful objects in algebraic geometry.
The first explicit computation of these loci for n>2 was carried out in Tony Shaska’s doctoral thesis, Genus 2 Curves Covering Elliptic Curves (University of Florida, 2001). This work provided explicit equations for the corresponding Humbert surfaces, describing all genus-two curves whose Jacobians are (n,n)-split. These results opened the way for modern studies of higher-genus isogenies and remain a foundational reference in the field.
Today, this geometric framework underpins the development of hyperelliptic isogeny-based cryptosystems, extending the ideas of elliptic isogeny cryptography to more complex moduli spaces. The structure of the (n,n)-split locus determines the shape of isogeny graphs, the endomorphism rings of the underlying abelian varieties, and the computational assumptions that define the security of next-generation protocols. From both a mathematical and cryptographic perspective, this line of research continues to bridge deep geometry with practical post-quantum cryptography.