Cube

What Is Elliptic Curve Cryptography?

Learn what Elliptic Curve Cryptography is, how ECC works, why it uses small keys, and how it powers signatures and key exchange.

What Is Elliptic Curve Cryptography? hero image

Introduction

Elliptic Curve cryptography is a way to build public-key cryptography from arithmetic on specially chosen curves over finite fields. It matters because it gives strong security with relatively small keys, which is why it appears in digital signatures, secure key exchange, wallets, blockchains, and network protocols.

That combination can feel surprising at first. The equation y^2 = x^3 + a*x + b looks like algebra from a textbook, not the basis of systems that protect money and identities. The reason the idea works is not that curves are mystical or geometric in the everyday sense. It is that the points on a carefully chosen curve form an algebraic group with a useful asymmetry: combining a point with itself many times is easy, but reversing that process appears hard.

That asymmetry is the heart of ECC. Once you see it, the rest becomes much less mysterious. A private key is just a secret integer. A public key is that integer multiplied by a public base point. Key exchange works because two parties can arrive at the same shared point by scalar multiplication in either order. Signatures work because someone who knows the secret scalar can produce a relation that others can verify from the public point.

What problem does elliptic-curve cryptography solve?

Public-key cryptography needs a mathematical operation with two properties that pull in opposite directions. Honest users must be able to compute with it efficiently, but an attacker who sees the public result should not be able to reverse it and recover the secret. In RSA, that asymmetry comes from integer factorization. In ECC, it comes from the discrete logarithm problem in an elliptic-curve group.

The practical attraction of ECC is that it reaches a given classical security level with smaller keys than older public-key systems. RFC 6090 explicitly notes performance advantages at higher security levels, and NIST guidance ties curve security roughly to half the bit length of the subgroup order n. In practice, that is why 256-bit elliptic-curve groups are commonly used for about 128-bit classical security, while comparable RSA systems need much larger moduli.

Smaller keys are not just an aesthetic improvement. They reduce bandwidth, speed up many operations, shrink signatures and certificates, and make constrained devices easier to support. In blockchain systems, this has visible consequences: more compact transactions, lighter wallet storage, and cheaper verification paths. The exact tradeoffs depend on the chain and signature scheme, but the underlying reason is the same everywhere: ECC packs a lot of security into a small mathematical object.

What is an elliptic curve in cryptography?

In cryptography, an elliptic curve is usually not used over the real numbers as you might see in analytic geometry. It is used over a finite field. For prime-field curves, which are the main focus of RFC 6090 and many modern standards, the field is F_p, meaning arithmetic is done modulo a prime p. So when we write the curve equation y^2 = x^3 + a*x + b, we really mean that the equality holds modulo p.

That change matters. Over the reals, the curve is a smooth geometric shape. Over F_p, it becomes a finite set of point pairs (x, y) whose coordinates are integers modulo p satisfying the equation, plus a special identity element called the point at infinity. RFC 6090 defines exactly this structure: points on the curve are the coordinate pairs satisfying the equation, together with the special identity point.

Not every equation of that form is acceptable. The curve must be nonsingular, which for the short Weierstrass form means 4*a^3 + 27*b^2 ! = 0 mod p. This is the discriminant condition. If it fails, the curve has a singularity, and the group law breaks in ways that destroy the clean algebra cryptography depends on.

So the first important distinction is this: ECC is not “drawing a curve and using geometry.” It is doing algebra on a finite set of points that happen to be defined by a curve equation. The geometry gives intuition, but the cryptographic object is the finite group.

Why do points on an elliptic curve form a group?

The next question is the key one: why can points on such a curve be “added” at all?

The answer begins with a geometric rule. Over the real numbers, if you draw a line through two points on the curve, that line usually intersects the curve at a third point. Reflect that third point across the x-axis, and you get the sum of the original two points. If you add a point to itself, you use the tangent line instead. This picture explains the structure.

But it is only an intuition. In cryptography we work over a finite field, not a continuous plane, so implementations use algebraic addition and doubling formulas rather than literally drawing lines. RFC 6090 and SEC 1 both specify explicit formulas for point addition and point doubling in affine coordinates. The important invariant is that these formulas keep you inside the same set of curve points and define an associative group operation with an identity and inverses.

Here is what that buys us. If P is a point on the curve, then 2P means P + P, 3P means P + P + P, and more generally kP means adding P to itself k times, where k is an integer. This operation is called scalar multiplication. Despite the name, it is really repeated group addition, not ordinary coordinate-wise multiplication.

Scalar multiplication is the engine of ECC. Everything else is built on it.

How does ECC create a one-way map from private scalars to public keys?

Suppose a public system parameter gives everyone a particular point G, called the base point or generator, on the curve. Now choose a secret integer d in the interval 1 to n-1, where n is the order of the subgroup generated by G. Compute Q = dG. The integer d is the private key, and the point Q is the public key.

Going forward is efficient. Given d and G, you can compute Q with repeated doubling and addition, and practical algorithms do this much faster than naive repetition. Going backward is the hard part: given G and Q, recover d. That is the elliptic-curve discrete logarithm problem. NIST SP 800-186 defines the discrete logarithm problem in this setting as: given points P and R in the subgroup generated by P, find the integer k such that R = kP.

This is the compression point for ECC: the public key reveals the result of repeated group addition, but not the count used to produce it. We know efficient algorithms for scalar multiplication. We do not know efficient classical algorithms for solving the discrete log problem on properly chosen elliptic-curve groups at useful sizes.

That “properly chosen” qualifier matters. Security does not come from the shape of just any curve. It comes from using curves and subgroups that avoid known weak structures. Standards therefore insist on parameter checks: large prime subgroup order, acceptable cofactor, avoidance of anomalous curves and low embedding degree, and other conditions designed to keep the discrete log problem hard in the chosen group.

What are ECC domain parameters and why do they matter?

An elliptic-curve public key is never just “a point.” It only makes sense relative to a shared mathematical environment. Standards call that environment the domain parameters.

For a prime-field Weierstrass curve, SEC 1 gives the domain parameters as T = (p, a, b, G, n, h). Here p defines the field F_p; a and b define the curve equation; G is the base point; n is the prime order of the subgroup generated by G; and h is the cofactor, meaning the total number of curve points divided by n. RFC 6090 describes the same relationship as m = n * c, where c is the cofactor.

This is not bureaucratic detail. It is the mechanism that makes keys interoperable and secure. If two systems use different domain parameters, the same coordinate pair may represent unrelated objects. If the parameters are malformed, the hard problem may no longer be hard. That is why standards require parameter validation and why modern deployments typically use named, standardized curves rather than inventing new ones casually.

NIST SP 800-186 now recommends prime-field curves for new work and includes not only traditional Weierstrass curves such as P-256 but also modern Montgomery and Edwards curves like Curve25519, Curve448, Edwards25519, and Edwards448. It also marks binary-field curves as deprecated for new implementations. That evolution reflects implementation experience: the mathematics is related across these curve models, but some forms are easier to implement safely and efficiently.

How does elliptic-curve Diffie–Hellman (ECDH) create a shared secret?

The cleanest way to see ECC in action is with key agreement.

Imagine Alice and Bob agree on domain parameters and a base point G. Alice chooses a secret integer a and publishes A = aG. Bob chooses a secret integer b and publishes B = bG. An eavesdropper sees G, A, and B, but not a or b.

Alice now takes Bob’s public point B and computes aB. Because B = bG, this is a(bG) = (a*b)G. Bob takes Alice’s public point A and computes bA, which is b(aG) = (b*a)G. Since scalar multiplication in the subgroup is compatible in this way, both arrive at the same shared point.

That common value is the raw shared secret material. RFC 6090 notes that in ECDH, the x-coordinate of the shared point may be used as the shared secret in a compact-output form. SEC 1 similarly specifies ECDH primitives that output the x-coordinate of the derived point, with a cofactor variant computing h*d_U*Q_V to mitigate certain subgroup issues.

Why can’t an attacker do the same? Because producing the shared point from only A and B appears to require solving a hard discrete-log-style problem. Knowing A = aG does not reveal a; knowing B = bG does not reveal b. Without one of those scalars, the attacker cannot efficiently derive (a*b)G.

This same mechanism shows up all over applied cryptography. Stealth address systems derive one-time addresses from an elliptic-curve shared secret. X25519 and X448, defined in RFC 7748, package this idea into modern, implementation-friendly functions: they take a scalar and a Montgomery u-coordinate and return another u-coordinate. The underlying algebra is still scalar multiplication in an elliptic-curve group, but the interface is simplified to reduce implementation mistakes.

How do elliptic-curve signatures (ECDSA/EdDSA) use scalar multiplication?

ECC is also used for digital signatures. The basic idea is different from key agreement but relies on the same one-way map from secret scalar to public point.

For ECDSA, the signer has a private scalar d and public key Q = dG. To sign a message, the signer also needs a per-message secret k. FIPS 186-5 is explicit here: a fresh secret k, with 0 < k < n, must be generated for each signature, protected from disclosure, and never reused. The signature ultimately includes values commonly called r and s, derived from the message hash, the ephemeral point kG, the nonce k, and the private key d.

The mechanism matters more than memorizing formulas. ECDSA works because the signer can create a relation tying the message hash to the ephemeral point and the long-term public key in a way that verifies only if the signer knew both the private key and the nonce used to form that ephemeral point. If k is ever reused across two messages, or if an attacker learns enough about k, the private key can often be recovered. This is not a side issue; it is one of the central practical risks of ECDSA.

That is why deterministic ECDSA exists. FIPS 186-5 approves the RFC 6979 approach, where the per-message secret is derived deterministically rather than drawn from external randomness. This reduces the risk of catastrophic failure from a bad random-number generator. But it does not remove implementation risk. FIPS also warns that deterministic modes still need protection against side-channel and fault attacks, because leakage from the arithmetic can still reveal secrets.

RFC 6090 notes that its KT-I signature variant is mathematically and functionally equivalent to ECDSA. In practice, ECDSA remains widely deployed. Bitcoin and Ethereum both use signatures over the secp256k1 curve; Ethereum additionally relies on public-key recovery semantics to derive the sender from signature values over the transaction hash.

Why choose EdDSA (Ed25519) instead of ECDSA?

CharacteristicNonceFormulasImplementation riskCommon use
ECDSAPer-signature random kNon-complete formulas, edge casesHigher risk from RNG/nonce misuseCompatibility-heavy systems, Bitcoin
EdDSADeterministic per-message scalarComplete formulas, fewer edgesLower side-channel and nonce riskModern deployments, Ed25519
Figure 25.1: ECDSA vs EdDSA: practical differences

If ECDSA already works, why do many newer systems prefer EdDSA, especially Ed25519?

The short answer is that the same cryptographic goal can be packaged in a way that is often easier to implement safely. RFC 8032 defines EdDSA as a variant of Schnorr signatures using Edwards curves. It emphasizes several practical advantages: high performance, deterministic signing, improved side-channel resilience, small keys and signatures, and complete formulas.

“Complete formulas” is an especially important phrase. On many curve models, some formulas have exceptional cases, so implementations must be careful about point validation and edge conditions. RFC 8032 highlights that the formulas used for Ed25519 and Ed448 are complete: they are valid for all input points. That does not eliminate every implementation concern, but it removes a whole class of brittle corner cases.

Deterministic signing also changes the operational risk profile. In ECDSA, nonce misuse is notorious because it can directly leak the private key. In EdDSA, signatures are deterministic by design, which removes that entire failure mode. That does not mean EdDSA is automatically safe under every implementation mistake, but it explains why protocols increasingly adopted it where compatibility constraints allowed.

This is visible across blockchain ecosystems. Cosmos SDK documentation notes secp256k1 as the default key type while also supporting ed25519. Cardano wallet standards use Ed25519-based HD derivation variants for wallet keys. These are not arbitrary ecosystem quirks; they reflect real differences in signature-system design, implementation ergonomics, and compatibility requirements.

What are the different elliptic-curve models (Weierstrass, Montgomery, Edwards)?

ModelCommon useArithmetic / benefitValidation / edge casesExample curves
Short WeierstrassSignatures and ECDH in standardsMature formulas, wide supportRequires careful point validationP-256, secp256k1
MontgomeryDiffie–Hellman / X-only key exchangeFast x-only ladder, constant-timeu-coordinate rules, clamping requiredX25519, X448
Twisted EdwardsEdDSA signaturesHigh-speed, complete formulasFewer exceptional cases to checkEd25519, Ed448
Figure 25.2: Curve models compared: Weierstrass, Montgomery, Edwards

A common beginner mistake is to think “elliptic curve” means exactly one equation and one algorithm. In reality, there are several curve models and several protocol families built on them.

Short Weierstrass curves are the classical form used by standards such as SEC 1 and by curves like P-256 and secp256k1. Montgomery curves are used by X25519 and X448 for Diffie–Hellman-style key agreement. Twisted Edwards curves are used by Ed25519 and Ed448 for signatures. NIST SP 800-186 explains that these forms are mathematically related in important cases: mappings exist between certain Montgomery, Edwards, and Weierstrass representations.

That relationship explains both the unity and the diversity of ECC. The unity is that all of these systems rely on hard discrete-log problems in elliptic-curve groups. The diversity is that the chosen curve model strongly affects encoding rules, arithmetic formulas, performance, side-channel behavior, and protocol interfaces.

So when someone says “ECC,” they might mean the underlying idea in general, or they might mean a specific family such as ECDSA on secp256k1, ECDH on P-256, X25519 key exchange, or Ed25519 signatures. The family matters because the implementation rules differ.

What assumptions and checks does ECC security depend on?

The standard high-level claim is that ECC security rests on the hardness of the elliptic-curve discrete logarithm problem. That is true, but incomplete. In practice, there are at least three layers of assumptions.

The first layer is mathematical structure. The curve and subgroup must avoid known weak cases. RFC 6090 warns against insecure parameter patterns and requires the subgroup order to be divisible by a large prime. SEC 1 requires validation conditions such as nonsingularity, prime subgroup order, correct base point order, and checks against classes vulnerable to MOV-type reductions. NIST SP 800-186 adds criteria such as bounded cofactor, non-anomalous order, and sufficiently large embedding degree.

The second layer is input validation. Even if the curve is sound, accepting malformed public points can break security. RFC 6090 explicitly warns that implementations must not assume arbitrary coordinate pairs are legitimate curve points, because bogus-curve and related attacks can leak private keys. SEC 1 therefore specifies public-key validation checks: the point must not be the identity, must lie on the curve, and for full validation must satisfy nQ = O, ensuring subgroup membership.

The third layer is implementation discipline. Side-channel leakage, fault attacks, nonce misuse, unsafe encodings, or protocol mistakes can destroy security even when the math is fine. This is where a lot of real engineering lives. Libraries such as libsecp256k1 focus heavily on constant-time operations, constant-memory-access patterns, blinding, controlled APIs, and extensive tests precisely because fast elliptic-curve arithmetic is not enough; it must also avoid leaking secrets through timing or memory behavior.

Can elliptic-curve parameters hide weaknesses or backdoors?

ECC has one more trust issue worth understanding. Because the security of the system depends on the chosen group, people naturally ask whether curve parameters could hide weaknesses.

Modern standards respond in part by making parameter choices explicit and, in some cases, auditable. RFC 7748 describes deterministic procedures and selection criteria for Curve25519 and Curve448. NIST SP 800-186 includes structured domain parameters and, for pseudorandom Weierstrass curves, associated seeds and values related to their generation. The broad goal is the same: reduce the need to trust unexplained constants.

Why is this concern not merely hypothetical? Because elliptic curves have also appeared in a notorious cautionary tale: Dual EC DRBG. That generator used elliptic-curve points in a way that became vulnerable if the relationship between two standardized points was secretly known. The issue there was not that elliptic curves themselves were broken. It was that parameter relationships inside a construction could create a backdoor. The lesson is narrower and more useful than panic: in ECC, unexplained constants deserve scrutiny.

How are elliptic-curve points, keys, and signatures encoded on the wire?

EncodingBytesValidation needsUse casesInteroperability risk
Uncompressed (x,y)Full x and y (largest)Full on-curve and subgroup checksLegacy protocols, full validationParser mismatches break interop
Compressed (x + parity)x plus parity bit (smaller)Recover y and validate subgroupCertificates and bandwidth-sensitive systemsMalleability if checks skipped
x-only / u-coordinateSingle coordinate (smallest)Protocol-specific cofactor checksX25519/X448 compact ECDHTwist/cofactor pitfalls if unchecked
Figure 25.3: EC point encodings: compressed, uncompressed, and x-only

Cryptography does not happen only in equations. Points and scalars must be serialized into bytes, transmitted, stored, and parsed. This is where many interoperability bugs live.

SEC 1 precisely defines conversions between field elements, integers, points, and octet strings, including point compression. RFC 6090 discusses compact representation, especially using only the x-coordinate where protocol conventions allow it. RFC 7748 goes further and defines X25519/X448 directly as byte-oriented functions on scalars and u-coordinates, including rules for non-canonical inputs and masking bits on receipt.

These are not mere packaging details. Encoding rules shape malleability properties, parser behavior, and cross-implementation compatibility. RFC 8032, for example, specifies how EdDSA points are encoded and emphasizes checks such as requiring the scalar component S to be smaller than the group order to prevent signature malleability.

The deeper point is that an elliptic-curve scheme is not just “curve math.” It is the math plus the exact byte-level conventions around it. Two implementations can be mathematically similar and still fail to interoperate (or worse, interoperate unsafely) if they parse or normalize values differently.

What people actually use ECC for

ECC shows up anywhere a system needs public-key signatures, key agreement, or derived constructions built on those primitives.

In secure messaging and transport, X25519 and X448 are common key-agreement choices. In digital-signature ecosystems, ECDSA remains entrenched in compatibility-heavy environments, while Ed25519 and Ed448 are common where newer designs are acceptable. In blockchains, ECC often sits at the account and transaction boundary: Bitcoin uses secp256k1-based signatures; Ethereum uses secp256k1 signatures with recovery to identify the sender; smart contracts on Ethereum access elliptic-curve operations through precompiled contracts; Cosmos supports both secp256k1 and ed25519 in its key infrastructure; Cardano uses Ed25519-derived wallet key machinery.

These examples are different at the protocol level, but the recurring pattern is the same. A user holds a secret scalar. The network or counterparty sees a public key or a public ephemeral value derived from scalar multiplication. The hard problem prevents outsiders from reversing that derivation.

That is why ECC also underpins nearby primitives. Pedersen commitments rely on discrete-log hardness in elliptic-curve groups. Stealth addresses rely on elliptic-curve Diffie–Hellman. Hash-to-curve standards map arbitrary strings into curve points so that higher-level constructions can safely use elliptic-curve groups as hash targets.

What ECC does not solve

ECC is powerful, but it is not magic.

It does not remove the need for good protocol design. A strong signature algorithm will not save a system that signs the wrong thing or fails to separate domains correctly. A strong key-agreement primitive will not rescue a protocol that mishandles key confirmation or transcript binding. And while ECC is efficient against classical attackers, FIPS 186-5 explicitly notes that approved elliptic-curve signature algorithms are not expected to resist attacks from a large-scale quantum computer.

It also does not free implementers from careful engineering. Invalid-curve attacks, side channels, faulty randomness, parsing mismatches, subgroup issues, and unsafe parameter choices are all very real. Much of modern ECC practice is really the story of learning which abstractions are elegant in theory and which details are dangerous in deployed code.

Conclusion

ECC works because it turns a simple algebraic asymmetry into useful cryptographic tools. On a carefully chosen elliptic-curve group, computing Q = dG is easy, but recovering d from G and Q appears hard. That one fact supports public keys, shared-secret derivation, and digital signatures.

If you want the durable intuition to remember tomorrow, it is this: **Elliptic Curve Cryptography is not about curves as pictures; it is about hard-to-reverse multiplication in a finite group of curve points. ** The curve equation defines the group, the domain parameters define the environment, scalar multiplication does the work, and everything secure depends on choosing the right group and handling it carefully.

What should you understand before using this part of crypto infrastructure?

Before trading, depositing, or transferring assets that rely on elliptic-curve cryptography (ECC), you should confirm the curve, address format, and signature semantics so you avoid malleability, invalid-curve, or cross-chain mistakes. Cube Exchange uses standard on‑chain deposit and withdrawal flows; follow the checks below to verify an address, fund your account, and proceed to trade or withdraw safely.

  1. Identify the curve and signature scheme the asset or chain uses (for example, secp256k1 for Bitcoin/Ethereum, ed25519 for Solana/Cardano).
  2. Verify the deposit address format on Cube matches that curve (e.g., 0x-prefixed hex for Ethereum/secp256k1, bech32/ed25519 formats where applicable); if importing an address, confirm the wallet supports the same curve and encoding.
  3. Check any protocol-specific details that affect transfers (e.g., whether signatures use recovery semantics (v/r/s) or compressed points, and whether the chain requires special handling for cofactor or shared-secret outputs) before sending funds.
  4. Fund your Cube account via the recommended on‑chain deposit flow, wait for the chain’s finality/confirmation threshold, then open the market or place the transfer or trade on Cube.

Frequently Asked Questions

Why do implementations need to validate public elliptic-curve points — what happens if they don't?
+
Because accepting arbitrary coordinate pairs can enable invalid-curve, bogus-curve, or small-subgroup attacks that let an attacker extract private scalars; standards therefore require checks such as “point not identity,” “point lies on the curve,” and (for full validation) that n·Q = O to ensure subgroup membership. RFC 6090 and SEC 1 explicitly warn that skipping these validations breaks security, and practical guidance in NIST SP 800-186 similarly emphasizes validating domain parameters and cofactors.
What practical differences make EdDSA preferred over ECDSA in many new systems?
+
EdDSA (e.g., Ed25519) packages the same discrete-log hard problem into a signature scheme with deterministic signing, complete formulas, and implementation-friendly interfaces that reduce nonce and exceptional-case risks; ECDSA is older and widely deployed but relies on per-signature randomness and has more corner cases that increase implementation risk. RFC 8032 and the article highlight these practical trade-offs while noting deterministic modes and side‑channel protections remain necessary for both families.
How do curve cofactors affect ECDH, and what should protocols do about small-order inputs?
+
Cofactors matter because small-order or twist points can cause incorrect or trivial shared secrets; standards offer two common mitigations — clear the cofactor (multiply by h) or check for and abort on invalid/special shared outputs — but documents like RFC 7748 permit but do not universally require aborting on all-zero shared secrets, leaving some protocol-level choices to designers. NIST-SP-800-186 and SEC 1 also require bounded/acceptable cofactors and advise careful handling of subgroup membership.
If ECC keys are much smaller than RSA keys, does that mean ECC is less secure?
+
No — smaller ECC keys do not imply weaker security for the same classical threat model; elliptic-curve groups reach comparable resistance to known classical attacks with much shorter key lengths (for example, a 256-bit elliptic-curve group is commonly used for about 128 bits of classical security versus a much larger RSA modulus). RFC 6090 and NIST guidance explain that this compactness is the main practical advantage of ECC.
Are elliptic‑curve signatures and key exchange safe against quantum computers?
+
Elliptic-curve schemes are not expected to resist a sufficiently large general-purpose quantum computer — a large-scale quantum would break the underlying discrete-log assumption and thus defeat ECDSA/EdDSA and ECDH; standards such as FIPS 186-5 explicitly state this limitation. Transition and hybrid strategies are discussed in guidance but concrete migration timelines are left to policy decisions.
How does nonce reuse in ECDSA leak private keys, and does deterministic signing fully solve that problem?
+
In ECDSA, reusing or leaking the per-signature nonce k gives equations that let an attacker solve for the long-term private key, so deterministic nonce generation (RFC 6979) or strong RNGs are recommended; however, deterministic signing reduces RNG risk but does not eliminate side‑channel or fault attacks, which FIPS 186-5 warns must still be mitigated. SEC 1 and the article emphasize that nonce misuse is a central practical failure mode for ECDSA.
Why do protocols usually use named curves instead of creating new elliptic-curve parameters?
+
Standards and libraries favor named, well-studied domain parameters because interoperability and security both depend on exactly which curve, base point, subgroup order, and cofactor are used; using standard curves reduces the risk of accidentally choosing parameters with weak structure or hidden relationships (the Dual EC DRBG episode is a concrete cautionary example). RFC 6090, NIST SP 800-186, and the article stress using vetted parameters and performing parameter validation rather than inventing ad hoc curves.
Can different point encodings or compression schemes cause security or interoperability problems?
+
Byte-level encodings and point-compression rules affect interoperability and security properties like signature malleability and parser acceptance; SEC 1, RFC 6090, RFC 7748, and RFC 8032 therefore specify precise octet-string and coordinate encodings and warn that inconsistent handling of non-canonical inputs or compressed formats can create compatibility issues or security surprises. Implementations must follow the wire-format rules in the relevant standard for the curve model in use.
Given a public key point Q = dG, why can't an attacker compute the private scalar d?
+
Recovering the private scalar from a public point is precisely the elliptic-curve discrete logarithm problem, which is believed hard for properly chosen curves and subgroup parameters; standards require parameter checks (large prime subgroup order, nonsingularity, acceptable embedding degree, etc.) because the hardness depends on avoiding known weak cases. NIST, RFC 6090, and SEC 1 collectively describe these mathematical and validation prerequisites.

Your Trades, Your Crypto