Quantum security analysis of CSIDH
From MaRDI portal
Publication:2119022
DOI10.1007/978-3-030-45724-2_17zbMath1492.81039OpenAlexW3023347448MaRDI QIDQ2119022
André Schrottenloher, Xavier Bonnetain
Publication date: 23 March 2022
Full work available at URL: https://hal.inria.fr/hal-01896046v2/file/537.pdf
post-quantum cryptographyquantum cryptanalysisquantum circuitshidden shift problemisogeny-based cryptography
Quantum computation (81P68) Cryptography (94A60) Elliptic curves (14H52) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94) Communication complexity, information complexity (68Q11)
Related Items (31)
SoK: how (not) to design and implement post-quantum cryptography ⋮ Towards post-quantum security for signal's X3DH handshake ⋮ An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Post-quantum adaptor signature for privacy-preserving off-chain payments ⋮ Fully projective radical isogenies in constant-time ⋮ Safe-error attacks on SIKE and CSIDH ⋮ An efficient post-quantum KEM from CSIDH ⋮ Practical post-quantum signature schemes from isomorphism problems of trilinear forms ⋮ On the Security of OSIDH ⋮ Séta: Supersingular Encryption from Torsion Attacks ⋮ SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH ⋮ SCALLOP: scaling the CSI-FiSh ⋮ Disorientation faults in CSIDH ⋮ Candidate trapdoor claw-free functions from group actions with applications to quantum protocols ⋮ Full quantum equivalence of group action DLog and CDH, and more ⋮ Take your MEDS: digital signatures from matrix code equivalence ⋮ \textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twist ⋮ \( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space ⋮ DeCSIDH: delegating isogeny computations in the CSIDH setting ⋮ Key-oblivious encryption from isogenies with application to accountable tracing signatures ⋮ On actively secure fine-grained access structures from isogeny assumptions ⋮ Post-quantum asynchronous deniable key exchange and the signal handshake ⋮ Cryptographic group actions and applications ⋮ Oblivious pseudorandom functions from isogenies ⋮ Improved classical and quantum algorithms for subset-sum ⋮ CSIDH: an efficient post-quantum commutative group action ⋮ Group signatures and more from isogenies and lattices: generic, simple, and efficient ⋮ One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols ⋮ An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ A fusion algorithm for solving the hidden shift problem in finite abelian groups ⋮ \textsf{CSI-RAShi}: distributed key generation for CSIDH
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Cryptographic hash functions from expander graphs
- On Lovász' lattice reduction and the nearest lattice point problem
- Lattice basis reduction: Improved practical algorithms and solving subset sum problems
- Hidden shift quantum cryptanalysis and implications
- Quantum resource estimates for computing elliptic curve discrete logarithms
- CSIDH: an efficient post-quantum commutative group action
- A faster way to the CSIDH
- A note on the security of CSIDH
- A trade-off between classical and quantum circuit size for an attack against CSIDH
- CSI-FiSh: efficient isogeny based signatures through class group computations
- A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
- SeaSign: compact isogeny signatures from class group actions
- Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
- Finding closest lattice vectors using approximate Voronoi cells
- Faster SeaSign signatures through improved rejection sampling
- On Lions and elligators: an efficient constant-time implementation of CSIDH
- Applying Grover’s Algorithm to AES: Quantum Resource Estimates
- Another Subexponential-time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- Fast heuristic algorithms for computing relations in the class group of a quadratic order, with applications to isogeny evaluation
- Improved Generic Algorithms for Hard Knapsacks
- A Note on Bennett’s Time-Space Tradeoff for Reversible Computation
- Time/Space Trade-Offs for Reversible Computation
- A $T = O(2^{n/2} )$, $S = O(2^{n/4} )$ Algorithm for Certain NP-Complete Problems
- Constructing elliptic curve isogenies in quantum subexponential time
- A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- Towards optimized and constant-time CSIDH on embedded devices
This page was built for publication: Quantum security analysis of CSIDH