Quantum security analysis of CSIDH

From MaRDI portal
Publication:2119022

DOI10.1007/978-3-030-45724-2_17zbMath1492.81039OpenAlexW3023347448MaRDI QIDQ2119022

André Schrottenloher, Xavier Bonnetain

Publication date: 23 March 2022

Full work available at URL: https://hal.inria.fr/hal-01896046v2/file/537.pdf




Related Items (31)

SoK: how (not) to design and implement post-quantum cryptographyTowards post-quantum security for signal's X3DH handshakeAn efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniablePost-quantum adaptor signature for privacy-preserving off-chain paymentsFully projective radical isogenies in constant-timeSafe-error attacks on SIKE and CSIDHAn efficient post-quantum KEM from CSIDHPractical post-quantum signature schemes from isomorphism problems of trilinear formsOn the Security of OSIDHSéta: Supersingular Encryption from Torsion AttacksSHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDHSCALLOP: scaling the CSI-FiShDisorientation faults in CSIDHCandidate trapdoor claw-free functions from group actions with applications to quantum protocolsFull quantum equivalence of group action DLog and CDH, and moreTake your MEDS: digital signatures from matrix code equivalence\textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twist\( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key spaceDeCSIDH: delegating isogeny computations in the CSIDH settingKey-oblivious encryption from isogenies with application to accountable tracing signaturesOn actively secure fine-grained access structures from isogeny assumptionsPost-quantum asynchronous deniable key exchange and the signal handshakeCryptographic group actions and applicationsOblivious pseudorandom functions from isogeniesImproved classical and quantum algorithms for subset-sumCSIDH: an efficient post-quantum commutative group actionGroup signatures and more from isogenies and lattices: generic, simple, and efficientOne-way functions and malleability oracles: hidden shift attacks on isogeny-based protocolsAn efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniableA fusion algorithm for solving the hidden shift problem in finite abelian groups\textsf{CSI-RAShi}: distributed key generation for CSIDH


Uses Software


Cites Work


This page was built for publication: Quantum security analysis of CSIDH