Oblivious pseudorandom functions from isogenies
From MaRDI portal
Publication:2692394
DOI10.1007/978-3-030-64834-3_18OpenAlexW3111514642MaRDI QIDQ2692394
Dmitry Kogan, Dan Boneh, Katharine Woo
Publication date: 21 March 2023
Full work available at URL: https://doi.org/10.1007/978-3-030-64834-3_18
Related Items (10)
Improved torsion-point attacks on SIDH variants ⋮ On the Security of OSIDH ⋮ Supersingular curves you can trust ⋮ Proving knowledge of isogenies: a survey ⋮ Round-optimal oblivious transfer and MPC from computational CSIDH ⋮ A new isogeny representation and applications to cryptography ⋮ SIDH proof of knowledge ⋮ Cryptanalysis of an oblivious PRF from supersingular isogenies ⋮ Round-optimal verifiable oblivious pseudorandom functions from ideal lattices ⋮ On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Another look at some isogeny hardness assumptions
- Cryptographic hash functions from expander graphs
- Claw finding algorithms using quantum walk
- Parallel collision search with cryptanalytic applications
- The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
- OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
- Distributed SSH key management with proactive RSA threshold signatures
- Faster algorithms for isogeny problems using torsion point images
- CSIDH: an efficient post-quantum commutative group action
- On the cost of computing isogenies between supersingular elliptic curves
- Secure integration of asymmetric and symmetric encryption schemes
- Computational problems in supersingular elliptic curve isogenies
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- General linear group action on tensors: a candidate for post-quantum cryptography
- Simple oblivious transfer protocols compatible with supersingular isogenies
- SpOT-light: lightweight private set intersection from sparse OT extension
- Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
- Isogeny-Based Quantum-Resistant Undeniable Signatures
- On the Security of Supersingular Isogeny Cryptosystems
- Number-theoretic constructions of efficient pseudo-random functions
- Fast Secure Computation of Set Intersection
- Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection
- The Arithmetic of Elliptic Curves
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Advances in Cryptology - CRYPTO 2003
- Simulatable Adaptive Oblivious Transfer
- A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- Theory of Cryptography
- Efficient Compression of SIDH Public Keys
- Identification protocols and signature schemes based on supersingular isogeny problems
This page was built for publication: Oblivious pseudorandom functions from isogenies