\textsf{CSI-RAShi}: distributed key generation for CSIDH
From MaRDI portal
Publication:2118548
Recommendations
Cites work
- scientific article; zbMATH DE number 176567 (Why is no real title available?)
- scientific article; zbMATH DE number 177618 (Why is no real title available?)
- scientific article; zbMATH DE number 1023994 (Why is no real title available?)
- A faster way to the CSIDH
- CSI-FiSh: efficient isogeny based signatures through class group computations
- CSIDH: an efficient post-quantum commutative group action
- Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices
- Collapse-binding quantum commitments without random oracles
- Computationally binding quantum commitments
- Group-oriented (t, n) threshold digital signature scheme and digital multisignature
- He gives C-sieves on the CSIDH
- How to share a secret
- Post-quantum security of Fiat-Shamir
- Practical threshold signatures
- Quantum security analysis of CSIDH
- Robust threshold DSS signatures
- Sashimi: cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol
- SeaSign: compact isogeny signatures from class group actions
- Secure distributed key generation for discrete-log based cryptosystems
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- Threshold schemes from isogeny assumptions
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
Cited in
(14)- Generating supersingular elliptic curves over \(\mathbb{F}_p\) with unknown endomorphism ring
- Aggregatable distributed key generation
- A Tightly Secure Identity-Based Signature Scheme from Isogenies
- Practical robust DKG protocols for CSIDH
- Threshold schemes from isogeny assumptions
- CSI-SharK: CSI-FiSh with sharing-friendly keys
- Identity-based threshold signatures from isogenies
- New proof systems and an OPRF from CSIDH
- VSS from distributed ZK proofs and applications
- Cutting the GRASS: threshold group action signature schemes
- On actively secure fine-grained access structures from isogeny assumptions
- An isogeny-based ID protocol using structured public keys
- Sashimi: cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol
- Round-robin is optimal: lower bounds for group action based protocols
This page was built for publication: \textsf{CSI-RAShi}: distributed key generation for CSIDH
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2118548)