I'm exploring a hypothetical scenario for educational and cryptographic understanding. This question assumes an impossible or currently unknown shortcut, and I'm not suggesting this is actually feasible. My goal is to understand whether such a shortcut would compromise the security of the secp256k1 elliptic curve.
Curve context:
I'm referring to the elliptic curve secp256k1, used in Bitcoin and Ethereum, defined over a finite field by:
$y^2 = x^3 + 7 \mod p$
Let:
- $G$ be the generator point.
- $2G = G +G$
- $4G = 2G + 2G$
- Each point $P = (x, y)$
The hypothetical assumption:
Assume that it were possible to compute the y-coordinate of $4G$ (denoted as $4G(y)$) given only the y-coordinate of $2G$ ($2G(y)$), without knowing the corresponding x-coordinate. I understand this is not possible under current mathematics, but I'm assuming it just for the sake of analysis.
My questions:
Would such a function (let's call it f) that maps $2G(y) → 4G(y)$ compromise the security of the elliptic curve (specifically secp256k1)?
Could this hypothetical function be used to weaken or break the hardness of the Elliptic Curve Discrete Logarithm Problem (ECDLP)?
How might an attacker use this ability to compromise cryptographic systems based on secp256k1 (e.g., ECDSA, Schnorr signatures, ECDH)?
My understanding so far:
Scalar multiplication on an elliptic curve (e.g., computing $kG$) is only supposed to be possible through full knowledge of the point $(x, y)$ and the use of the group law.
If one could compute $4G(y)$ from just $2G(y)$, this implies some predictability or shortcut in scalar multiplication, even from partial point information.
This could potentially break assumptions about the irreversibility of scalar multiplication, which ECDLP-based security relies on.
In theory, if this shortcut generalized, it could be used to reduce the complexity of solving for $k$ given $kG$.
I'm asking:
If it were feasible compute $4G(y)$ from $2G(y)$
Would that break ECC security?
And how might that leak be exploited by an attacker?