On actively secure fine-grained access structures from isogeny assumptions
From MaRDI portal
Publication:6166994
DOI10.1007/978-3-031-17234-2_18zbMATH Open1517.94075MaRDI QIDQ6166994FDOQ6166994
Authors: Fabio Campos, Philipp Muth
Publication date: 7 July 2023
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Recommendations
- Threshold schemes from isogeny assumptions
- Sashimi: cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol
- Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms
- New assumptions on isogenous pairing groups with applications to attribute-based encryption
- Access Structures of Elliptic Secret Sharing Schemes
Cites Work
- How to share a secret
- Title not available (Why is that?)
- Publicly verifiable secret sharing
- Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures
- Public Key Cryptography - PKC 2006
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- CSI-FiSh: efficient isogeny based signatures through class group computations
- Theory of Cryptography
- Performing computations on hierarchically shared secrets
- Threshold schemes from isogeny assumptions
- Sharing the LUOV: threshold post-quantum signatures
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- \textsf{CSI-RAShi}: distributed key generation for CSIDH
- Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol
Cited In (5)
This page was built for publication: On actively secure fine-grained access structures from isogeny assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6166994)