\textsf{CSI-RAShi}: distributed key generation for CSIDH
From MaRDI portal
Publication:2118548
DOI10.1007/978-3-030-81293-5_14zbMath1485.94057OpenAlexW3097199134MaRDI QIDQ2118548
Robi Pedersen, Frederik Vercauteren, Lucas Disson, Ward Beullens
Publication date: 22 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-81293-5_14
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items
An isogeny-based ID protocol using structured public keys, On actively secure fine-grained access structures from isogeny assumptions
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Secure distributed key generation for discrete-log based cryptosystems
- CSIDH: an efficient post-quantum commutative group action
- A faster way to the CSIDH
- Threshold schemes from isogeny assumptions
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- CSI-FiSh: efficient isogeny based signatures through class group computations
- SeaSign: compact isogeny signatures from class group actions
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- Post-quantum security of Fiat-Shamir
- Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices
- Robust Threshold DSS Signatures
- Collapse-Binding Quantum Commitments Without Random Oracles
- How to share a secret
- Group-oriented (t, n) threshold digital signature scheme and digital multisignature
- Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol
- Computationally Binding Quantum Commitments