An isogeny-based ID protocol using structured public keys
From MaRDI portal
Publication:2149792
DOI10.1007/978-3-030-92641-0_9zbMATH Open1492.94061OpenAlexW4206287944MaRDI QIDQ2149792FDOQ2149792
Robi Pedersen, Karim Baghery, Daniele Cozzo
Publication date: 29 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-92641-0_9
Cryptography (94A60) Quantum computation (81P68) Quantum cryptography (quantum-theoretic aspects) (81P94) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Constructing elliptic curve isogenies in quantum subexponential time
- Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
- On Zeros of a Polynomial in a Finite Grid
- A Rigorous Subexponential Algorithm For Computation of Class Groups
- CSIDH: an efficient post-quantum commutative group action
- Towards practical key exchange from ordinary isogeny graphs
- CSI-FiSh: efficient isogeny based signatures through class group computations
- SeaSign: compact isogeny signatures from class group actions
- SQISign: compact post-quantum signatures from quaternions and isogenies
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- Identification protocols and signature schemes based on supersingular isogeny problems
- Post-quantum security of Fiat-Shamir
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
- A faster way to the CSIDH
- On the quaternion \(\ell\)-isogeny path problem
- Faster SeaSign signatures through improved rejection sampling
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- \textsf{CSI-RAShi}: distributed key generation for CSIDH
- Circuit amortization friendly encodingsand their application to statistically secure multiparty computation
Cited In (11)
- A new paradigm for public key identification
- Identification scheme and forward-secure signature in identity-based setting from isogenies
- Round-robin is optimal: lower bounds for group action based protocols
- SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH
- Identity-based threshold signatures from isogenies
- VSS from distributed ZK proofs and applications
- Key-oblivious encryption from isogenies with application to accountable tracing signatures
- Practical robust DKG protocols for CSIDH
- New proof systems and an OPRF from CSIDH
- CSI-SharK: CSI-FiSh with sharing-friendly keys
- Generic models for group actions
Uses Software
This page was built for publication: An isogeny-based ID protocol using structured public keys
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2149792)