CSI-SharK: CSI-FiSh with sharing-friendly keys
From MaRDI portal
Publication:6535498
DOI10.1007/978-3-031-35486-1_21zbMATH Open1545.94081MaRDI QIDQ6535498FDOQ6535498
Authors: Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
Publication date: 11 January 2024
Recommendations
- Threshold schemes from isogeny assumptions
- \textsf{CSI-RAShi}: distributed key generation for CSIDH
- Sashimi: cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol
- Practical robust DKG protocols for CSIDH
- Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512
Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94) Authentication, digital signatures and secret sharing (94A62) Isogeny (14K02)
Cites Work
- How to share a secret
- The Arithmetic of Elliptic Curves
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Title not available (Why is that?)
- Secure distributed key generation for discrete-log based cryptosystems
- Constructing elliptic curve isogenies in quantum subexponential time
- Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
- On zeros of a polynomial in a finite grid
- Identification scheme and forward-secure signature in identity-based setting from isogenies
- CSIDH: an efficient post-quantum commutative group action
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- CSI-FiSh: efficient isogeny based signatures through class group computations
- SeaSign: compact isogeny signatures from class group actions
- SQISign: compact post-quantum signatures from quaternions and isogenies
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512
- Identification protocols and signature schemes based on supersingular isogeny problems
- Post-quantum security of Fiat-Shamir
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
- A faster way to the CSIDH
- Threshold schemes from isogeny assumptions
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- \textsf{CSI-RAShi}: distributed key generation for CSIDH
- Circuit amortization friendly encodingsand their application to statistically secure multiparty computation
- Sashimi: cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol
- An isogeny-based ID protocol using structured public keys
- Über die Classenzahl quadratischer Zahlkörper.
- Generic models for group actions
- Breaking SIDH in polynomial time
- An efficient key recovery attack on SIDH
Cited In (5)
This page was built for publication: CSI-SharK: CSI-FiSh with sharing-friendly keys
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6535498)