CSI-FiSh: efficient isogeny based signatures through class group computations
From MaRDI portal
Publication:2181880
DOI10.1007/978-3-030-34578-5_9zbMath1456.94050OpenAlexW2991397127MaRDI QIDQ2181880
Frederik Vercauteren, Ward Beullens, Thorsten Kleinjung
Publication date: 20 May 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-34578-5_9
Related Items (67)
SoK: how (not) to design and implement post-quantum cryptography ⋮ Dual lattice attacks for closest vector problems (with preprocessing) ⋮ CSIDH on the Surface ⋮ LegRoast: Efficient Post-quantum Signatures from the Legendre PRF ⋮ Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol ⋮ Trapdoor DDH groups from pairings and isogenies ⋮ An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Explicit Connections Between Supersingular Isogeny Graphs and Bruhat–Tits Trees ⋮ Post-quantum key-blinding for authentication in anonymity networks ⋮ Post-quantum adaptor signature for privacy-preserving off-chain payments ⋮ An isogeny-based ID protocol using structured public keys ⋮ Group signatures and more from isogenies and lattices: generic, simple, and efficient ⋮ Orientations and the supersingular endomorphism ring problem ⋮ Practical post-quantum signature schemes from isomorphism problems of trilinear forms ⋮ On the Security of OSIDH ⋮ Radical Isogenies on Montgomery Curves ⋮ Breaking the decisional Diffie-Hellman problem for class group actions using genus theory: extended version ⋮ A proof of the conjectured run time of the Hafner-McCurley class group algorithm ⋮ Supersingular curves you can trust ⋮ Proving knowledge of isogenies: a survey ⋮ SCALLOP: scaling the CSI-FiSh ⋮ Round-optimal oblivious transfer and MPC from computational CSIDH ⋮ Generic models for group actions ⋮ M-SIDH and MD-SIDH: countering SIDH attacks by masking information ⋮ Disorientation faults in CSIDH ⋮ A direct key recovery attack on SIDH ⋮ A lower bound on the length of signatures based on group actions and generic isogenies ⋮ Password-authenticated key exchange from group actions ⋮ Accelerating the Delfs-Galbraith algorithm with fast subfield root detection ⋮ I want to ride my \texttt{BICYCL} : \texttt{BICYCL} implements cryptography in class groups ⋮ Candidate trapdoor claw-free functions from group actions with applications to quantum protocols ⋮ A new isogeny representation and applications to cryptography ⋮ Horizontal racewalking using radical isogenies ⋮ Full quantum equivalence of group action DLog and CDH, and more ⋮ Cryptographic primitives with hinting property ⋮ Take your MEDS: digital signatures from matrix code equivalence ⋮ Graph-theoretic algorithms for the alternating trilinear form equivalence problem ⋮ \textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twist ⋮ \( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space ⋮ Two-round adaptively secure MPC from isogenies, LPN, or CDH ⋮ DeCSIDH: delegating isogeny computations in the CSIDH setting ⋮ Key-oblivious encryption from isogenies with application to accountable tracing signatures ⋮ On actively secure fine-grained access structures from isogeny assumptions ⋮ Attack on SHealS and HealS: the second wave of GPST ⋮ Stronger security and generic constructions for adaptor signatures ⋮ Efficiency of SIDH-based signatures (yes, SIDH) ⋮ SQISign: compact post-quantum signatures from quaternions and isogenies ⋮ Cryptographic group actions and applications ⋮ Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices ⋮ Identification scheme and forward-secure signature in identity-based setting from isogenies ⋮ Group signatures and more from isogenies and lattices: generic, simple, and efficient ⋮ Hash functions from superspecial genus-2 curves using Richelot isogenies ⋮ Orienting supersingular isogeny graphs ⋮ Approximate Voronoi cells for lattices, revisited ⋮ Post-Quantum Constant-Round Group Key Exchange from Static Assumptions ⋮ Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512 ⋮ Threshold schemes from isogeny assumptions ⋮ Compact, efficient and UC-secure isogeny-based oblivious transfer ⋮ Delay encryption ⋮ Breaking the decisional Diffie-Hellman problem for class group actions using genus theory ⋮ On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves ⋮ Delegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applications ⋮ \textsf{CSI-RAShi}: distributed key generation for CSIDH ⋮ SimS: a simplification of SiGamal ⋮ He gives C-sieves on the CSIDH ⋮ Quantum security analysis of CSIDH ⋮ Rational isogenies from irrational endomorphisms
Uses Software
This page was built for publication: CSI-FiSh: efficient isogeny based signatures through class group computations