A Tightly Secure Identity-Based Signature Scheme from Isogenies
From MaRDI portal
Publication:6493385
DOI10.1007/978-3-031-40003-2_6MaRDI QIDQ6493385FDOQ6493385
Authors: Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata
Publication date: 26 April 2024
Recommendations
- Identification scheme and forward-secure signature in identity-based setting from isogenies
- A tightly secure ID-based signature scheme under DL assumption in AGM
- Tight security for the generic construction of identity-based signature (in the multi-instance setting)
- Identification protocols and signature schemes based on supersingular isogeny problems
- Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512
Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Security arguments for digital signatures and blind signatures
- Identity-based cryptosystems and signature schemes
- The Arithmetic of Elliptic Curves
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- A Schnorr-Like Lightweight Identity-Based Signature Scheme
- Tightly secure signatures from lossy identification schemes
- Constructing elliptic curve isogenies in quantum subexponential time
- Security proofs for identity-based identification and signature schemes
- Tight security for the generic construction of identity-based signature (in the multi-instance setting)
- Identification scheme and forward-secure signature in identity-based setting from isogenies
- A generic construction of tightly secure signatures in the multi-user setting
- CSIDH: an efficient post-quantum commutative group action
- Quantum security analysis of CSIDH
- CSI-FiSh: efficient isogeny based signatures through class group computations
- SeaSign: compact isogeny signatures from class group actions
- SQISign: compact post-quantum signatures from quaternions and isogenies
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512
- \textsf{CSI-RAShi}: distributed key generation for CSIDH
- Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices
- Identity-based signatures
- Sashimi: cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol
- A new isogeny representation and applications to cryptography
- Lattice-based signatures with tight adaptive corruptions and more
- SCALLOP: scaling the CSI-FiSh
Cited In (3)
This page was built for publication: A Tightly Secure Identity-Based Signature Scheme from Isogenies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6493385)