Post-Quantum Constant-Round Group Key Exchange from Static Assumptions
From MaRDI portal
Publication:4964367
DOI10.1007/978-981-15-5191-8_18zbMATH Open1459.94141OpenAlexW3093953633MaRDI QIDQ4964367FDOQ4964367
Publication date: 25 February 2021
Published in: International Symposium on Mathematics, Quantum Theory, and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-981-15-5191-8_18
Recommendations
- Post-quantum zero knowledge in constant rounds
- Constant-round group key exchange from the ring-LWE assumption
- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
- Post-quantum static-static key agreement using multiple protocol instances
- A black-box approach to post-quantum zero-knowledge in constant rounds
- Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting
- Group action key encapsulation and non-interactive key exchange in the QROM
- The hidden subgroup problem and post-quantum group-based cryptography
- Group key establishment in a quantum-future scenario
- Pre- and post-quantum Diffie-Hellman from groups, actions, and isogenies
lattice-based cryptographypost-quantum cryptographyisogeny-based cryptographystatic assumptionsconstant-round group key exchange
Cites Work
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Title not available (Why is that?)
- Fully secure functional encryption with general relations from the decisional linear assumption
- Title not available (Why is that?)
- Protocols for authentification and key establishment
- Identifying supersingular elliptic curves
- Scalable protocols for authenticated group key exchange
- Title not available (Why is that?)
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- CSIDH: an efficient post-quantum commutative group action
- Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
- CSI-FiSh: efficient isogeny based signatures through class group computations
- Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
- Supersingular isogeny Diffie-Hellman authenticated key exchange
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves
- Compact adaptively secure ABE for \(\mathrm{NC}^1\) from \(k\)-lin
- Constant-round group key exchange from the Ring-LWE assumption
Cited In (2)
Uses Software
This page was built for publication: Post-Quantum Constant-Round Group Key Exchange from Static Assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4964367)