Full quantum equivalence of group action DLog and CDH, and more
From MaRDI portal
Publication:6135389
DOI10.1007/978-3-031-22963-3_1zbMath1519.94175MaRDI QIDQ6135389
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Related Items (3)
SCALLOP: scaling the CSI-FiSh ⋮ Generic models for group actions ⋮ Two remarks on the vectorization problem
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- The tight constant in the Dvoretzky-Kiefer-Wolfowitz inequality
- Lattice basis reduction: Improved practical algorithms and solving subset sum problems
- Cryptanalysis via algebraic spans
- CSIDH: an efficient post-quantum commutative group action
- Improved combinatorial algorithms for the inhomogeneous short integer solution problem
- On oriented supersingular elliptic curves
- Orienting supersingular isogeny graphs
- Threshold schemes from isogeny assumptions
- Compact, efficient and UC-secure isogeny-based oblivious transfer
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- General linear group action on tensors: a candidate for post-quantum cryptography
- CSI-FiSh: efficient isogeny based signatures through class group computations
- SeaSign: compact isogeny signatures from class group actions
- How to record quantum queries, and applications to quantum indifferentiability
- The distinction between fixed and random generators in group-based assumptions
- Cryptographic group actions and applications
- Another Subexponential-time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- Diffie-Hellman Oracles
- Algorithms for Black-Box Fields and their Application to Cryptography
- Cryptanalysis of Stickel’s Key Exchange Scheme
- Thompson’s Group and Public Key Cryptography
- New directions in cryptography
- CSIDH on the Surface
- On the Security of OSIDH
- Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions
- Constructing elliptic curve isogenies in quantum subexponential time
- Classical hardness of learning with errors
- A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- Private Puncturable PRFs from Standard Lattice Assumptions
This page was built for publication: Full quantum equivalence of group action DLog and CDH, and more