Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol
From MaRDI portal
Publication:5041220
DOI10.1007/978-3-030-44223-1_10zbMath1501.94067OpenAlexW2983248381MaRDI QIDQ5041220
Publication date: 13 October 2022
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-44223-1_10
Cryptography (94A60) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items
Post-quantum adaptor signature for privacy-preserving off-chain payments, Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption, SCALLOP: scaling the CSI-FiSh, A lower bound on the length of signatures based on group actions and generic isogenies, On actively secure fine-grained access structures from isogeny assumptions, Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices, \textsf{CSI-RAShi}: distributed key generation for CSIDH
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Provable security of (tweakable) block ciphers based on substitution-permutation networks
- CSIDH: an efficient post-quantum commutative group action
- Sharing the LUOV: threshold post-quantum signatures
- CSI-FiSh: efficient isogeny based signatures through class group computations
- SeaSign: compact isogeny signatures from class group actions
- Faster SeaSign signatures through improved rejection sampling
- Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security
- Robust Threshold DSS Signatures
- Theory of Cryptography
- Fast secure two-party ECDSA signing