An isogeny-based ID protocol using structured public keys
From MaRDI portal
Publication:2149792
Recommendations
- Identification protocols and signature schemes based on supersingular isogeny problems
- Isogeny-based certificateless identification scheme
- Identification protocols and signature schemes based on supersingular isogeny problems
- SQISign: compact post-quantum signatures from quaternions and isogenies
- Identification scheme and forward-secure signature in identity-based setting from isogenies
Cites work
- scientific article; zbMATH DE number 4191111 (Why is no real title available?)
- scientific article; zbMATH DE number 2086722 (Why is no real title available?)
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
- A Rigorous Subexponential Algorithm For Computation of Class Groups
- A faster way to the CSIDH
- CSI-FiSh: efficient isogeny based signatures through class group computations
- CSIDH: an efficient post-quantum commutative group action
- Circuit amortization friendly encodingsand their application to statistically secure multiparty computation
- Constructing elliptic curve isogenies in quantum subexponential time
- Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
- Faster SeaSign signatures through improved rejection sampling
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Identification protocols and signature schemes based on supersingular isogeny problems
- On the quaternion \(\ell\)-isogeny path problem
- On zeros of a polynomial in a finite grid
- Post-quantum security of Fiat-Shamir
- SQISign: compact post-quantum signatures from quaternions and isogenies
- SeaSign: compact isogeny signatures from class group actions
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- Towards practical key exchange from ordinary isogeny graphs
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- \textsf{CSI-RAShi}: distributed key generation for CSIDH
Cited in
(13)- Identification scheme and forward-secure signature in identity-based setting from isogenies
- A new paradigm for public key identification
- SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH
- Practical robust DKG protocols for CSIDH
- Isogeny-based certificateless identification scheme
- CSI-SharK: CSI-FiSh with sharing-friendly keys
- Key-oblivious encryption from isogenies with application to accountable tracing signatures
- Identity-based threshold signatures from isogenies
- New proof systems and an OPRF from CSIDH
- VSS from distributed ZK proofs and applications
- Generic models for group actions
- Identification protocols and signature schemes based on supersingular isogeny problems
- Round-robin is optimal: lower bounds for group action based protocols
This page was built for publication: An isogeny-based ID protocol using structured public keys
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2149792)