Robustly reusable fuzzy extractor from isogeny
From MaRDI portal
Publication:6589832
DOI10.1016/J.TCS.2024.114677MaRDI QIDQ6589832FDOQ6589832
Authors: Yu Zhou, Shengli Liu, Shuai Han
Publication date: 20 August 2024
Published in: Theoretical Computer Science (Search for Journal in Brave)
Cites Work
- Abelian varieties over finite fields
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Title not available (Why is that?)
- Number-theoretic constructions of efficient pseudo-random functions
- Advances in Cryptology - EUROCRYPT 2004
- Secure Remote Authentication Using Biometric Data
- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Handbook of Face Recognition
- CSIDH: an efficient post-quantum commutative group action
- CSI-FiSh: efficient isogeny based signatures through class group computations
- SeaSign: compact isogeny signatures from class group actions
- SQISign: compact post-quantum signatures from quaternions and isogenies
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Robustly reusable fuzzy extractor from standard assumptions
- Reusable fuzzy extractor from LWE
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption
- Verifiable delay functions from supersingular isogenies and pairings
- Generic constructions of robustly reusable fuzzy extractor
- Reusable fuzzy extractors for low-entropy distributions
- Efficient KDM-CCA secure public-key encryption for polynomial functions
- An Improved Robust Fuzzy Extractor
- Efficient, reusable fuzzy extractors from LWE
- Robustly reusable fuzzy extractor with imperfect randomness
- Title not available (Why is that?)
- Compact, efficient and UC-secure isogeny-based oblivious transfer
- Cryptographic group actions and applications
- Séta: Supersingular Encryption from Torsion Attacks
- Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices
- SiGamal: a supersingular isogeny-based PKE and its application to a PRF
- Group signatures and more from isogenies and lattices: generic, simple, and efficient
- Entropy Analysis and New Constructions of Biometric Key Generation Systems
- Breaking SIDH in polynomial time
- An efficient key recovery attack on SIDH
- A direct key recovery attack on SIDH
- Group action key encapsulation and non-interactive key exchange in the QROM
- Two-round adaptively secure MPC from isogenies, LPN, or CDH
- Round-optimal oblivious transfer and MPC from computational CSIDH
- Password-authenticated key exchange from group actions
- Full quantum equivalence of group action DLog and CDH, and more
- Verifiable isogeny walks: towards an isogeny-based postquantum VDF
This page was built for publication: Robustly reusable fuzzy extractor from isogeny
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6589832)