Identification protocols and signature schemes based on supersingular isogeny problems

From MaRDI portal
Publication:5920166

DOI10.1007/978-3-319-70694-8_1zbMath1420.94065OpenAlexW2977567083MaRDI QIDQ5920166

Steven D. Galbraith, Christophe Petit, Javier Silva

Publication date: 6 April 2018

Published in: Advances in Cryptology – ASIACRYPT 2017 (Search for Journal in Brave)

Full work available at URL: http://pure-oai.bham.ac.uk/ws/files/42838084/IdentificationProtocols.pdf




Related Items (35)

Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graphGroup Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny CryptosystemsThe Supersingular Isogeny Problem in Genus 2 and BeyondTrapdoor DDH groups from pairings and isogeniesLESS is More: Code-Based Signatures Without SyndromesOn isogeny graphs of supersingular elliptic curves over finite fieldsOn the hardness of the computational ring-LWR problem and its applicationsAn isogeny-based ID protocol using structured public keysFaster isogenies for post-quantum cryptography: SIKEA new adaptive attack on SIDHAn efficient post-quantum KEM from CSIDHA group identification protocol with leakage resilience of secret sharing schemeThe security of all private-key bits in isogeny-based schemesSupersingular curves you can trustAn efficient key recovery attack on SIDHBreaking SIDH in polynomial timeA lightweight identification protocol based on latticesA new isogeny representation and applications to cryptographyParallel isogeny path finding with limited memoryOn the feasibility of computing constructive Deuring correspondenceSQISign: compact post-quantum signatures from quaternions and isogeniesCryptographic group actions and applicationsB-SIDH: supersingular isogeny Diffie-Hellman using twisted torsionCSIDH: an efficient post-quantum commutative group actionOn the cost of computing isogenies between supersingular elliptic curvesCycles in the Supersingular ℓ-Isogeny Graph and Corresponding EndomorphismsHow not to create an isogeny-based PAKEA framework for quantum-classical cryptographic translationSupersingular Isogeny-based Cryptography: A SurveyComputational problems in supersingular elliptic curve isogeniesLimonnitsa: making Limonnik-3 post-quantumEndomorphism rings of supersingular elliptic curves over \(\mathbb{F}_p\)Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512Group key exchange protocols from supersingular isogeniesImplementation report of the Kohel-Lauter-Petit-Tignol algorithm for the constructive Deuring correspondence




This page was built for publication: Identification protocols and signature schemes based on supersingular isogeny problems