Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT
From MaRDI portal
Publication:6488028
DOI10.1007/978-3-030-65411-5_12zbMath1520.94049MaRDI QIDQ6488028
Emmanuela Orsini, Nigel P. Smart, Christophe Petit, Cyprien Delpech De Saint Guilhem
Publication date: 22 March 2023
Cryptography (94A60) Theory of compilers and interpreters (68N20) Data encryption (aspects in computer science) (68P25)
Related Items (2)
Cites Work
- Unnamed Item
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Definitions and properties of zero-knowledge proof systems
- Two-message statistically sender-private OT from LWE
- Faster algorithms for isogeny problems using torsion point images
- CSIDH: an efficient post-quantum commutative group action
- Supersingular isogeny Diffie-Hellman authenticated key exchange
- Computational problems in supersingular elliptic curve isogenies
- Two-round oblivious transfer from CDH or LPN
- Simple oblivious transfer protocols compatible with supersingular isogenies
- A framework for universally composable oblivious transfer from one-round key-exchange
- One-round authenticated group key exchange from isogenies
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- A New Approach to Practical Active-Secure Two-Party Computation
- The Simplest Protocol for Oblivious Transfer
- On the Security of Supersingular Isogeny Cryptosystems
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- A Framework for Efficient and Composable Oblivious Transfer
- A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
- Constructing elliptic curve isogenies in quantum subexponential time
- Separation Results on the “One-More” Computational Problems
- Identification protocols and signature schemes based on supersingular isogeny problems
This page was built for publication: Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT