An efficient authenticated key exchange from random self-reducibility on CSIDH
From MaRDI portal
Publication:831632
DOI10.1007/978-3-030-68890-5_4OpenAlexW3095589423MaRDI QIDQ831632FDOQ831632
Authors: Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi
Publication date: 24 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-68890-5_4
Cites Work
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Title not available (Why is that?)
- Title not available (Why is that?)
- Stronger Security of Authenticated Key Exchange
- One-round authenticated group key exchange from isogenies
- CSIDH: an efficient post-quantum commutative group action
- Class Field Theory
- Highly efficient key exchange protocols with optimal tightness
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Supersingular isogeny Diffie-Hellman authenticated key exchange
- Computational problems in supersingular elliptic curve isogenies
- Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512
- Strongly secure authenticated key exchange from supersingular isogenies
- Faster computation of isogenies of large prime degree
Cited In (11)
- Practical isogeny-based key-exchange with optimal tightness
- Towards post-quantum security for signal's X3DH handshake
- Post-quantum anonymous one-sided authenticated key exchange without random oracles
- Post-quantum asynchronous deniable key exchange and the signal handshake
- Group action key encapsulation and non-interactive key exchange in the QROM
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Solving the hidden number problem for CSIDH and CSURF via automated Coppersmith
- Password-authenticated key exchange from group actions
- Key exchange with tight (full) forward secrecy via key confirmation
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
Uses Software
This page was built for publication: An efficient authenticated key exchange from random self-reducibility on CSIDH
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q831632)