SIDH proof of knowledge
From MaRDI portal
Publication:6132414
DOI10.1007/978-3-031-22966-4_11zbMATH Open1519.94100OpenAlexW4320154950MaRDI QIDQ6132414FDOQ6132414
Authors: Luca De Feo, Samuel Dobson, Steven D. Galbraith, Lukas Zobernig
Publication date: 16 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22966-4_11
Recommendations
- Identification protocols and signature schemes based on supersingular isogeny problems
- A new adaptive attack on SIDH
- Identification protocols and signature schemes based on supersingular isogeny problems
- SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH
- Sigma protocols for MQ, PKP and SIS, and fishy signature schemes
Cites Work
- The Arithmetic of Elliptic Curves
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- Efficient concurrent zero-knowledge in the auxiliary string model
- Title not available (Why is that?)
- Strengthening zero-knowledge protocols using signatures
- CSIDH on the surface
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- A modular analysis of the Fujisaki-Okamoto transformation
- On the Security of Supersingular Isogeny Cryptosystems
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Post-quantum static-static key agreement using multiple protocol instances
- Computational problems in supersingular elliptic curve isogenies
- New techniques for SIDH-based NIKE
- On adaptive attacks against Jao-Urbanik's isogeny-based protocol
- Title not available (Why is that?)
- Isogeny-based quantum-resistant undeniable signatures
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
- Identification protocols and signature schemes based on supersingular isogeny problems
- Oblivious pseudorandom functions from isogenies
- A new adaptive attack on SIDH
Cited In (11)
- Sigma protocols for MQ, PKP and SIS, and fishy signature schemes
- Parallel isogeny path finding with limited memory
- Supersingular curves you can trust
- Proving knowledge of isogenies: a survey
- Efficient isogeny proofs using generic techniques
- Efficiency of SIDH-based signatures (yes, SIDH)
- An algorithm for efficient detection of \((N, N)\)-splittings and its application to the isogeny problem in dimension 2
- Isogeny problems with level structure
- Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees
- Exploring SIDH-based signature parameters
- New SIDH countermeasures for a more efficient key exchange
This page was built for publication: SIDH proof of knowledge
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6132414)