Generic models for group actions
From MaRDI portal
Publication:6070770
DOI10.1007/978-3-031-31368-4_15zbMath1527.94034OpenAlexW4367663814MaRDI QIDQ6070770
Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel, Julien Duman, Eike Kiltz, Dominik Hartmann
Publication date: 24 November 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-31368-4_15
Cites Work
- Unnamed Item
- Unnamed Item
- Security analysis of group action inverse problem with auxiliary inputs with application to CSIDH parameters
- Practical isogeny-based key-exchange with optimal tightness
- CSIDH: an efficient post-quantum commutative group action
- Interactively secure groups from obfuscation
- The algebraic group model and its applications
- Threshold schemes from isogeny assumptions
- A classification of computational assumptions in the algebraic group model
- He gives C-sieves on the CSIDH
- An isogeny-based ID protocol using structured public keys
- CSI-FiSh: efficient isogeny based signatures through class group computations
- Tight reductions for Diffie-Hellman variants in the algebraic group model
- Short signatures without random oracles and the SDH assumption in bilinear groups
- Cryptographic group actions and applications
- Multilinear Maps from Obfuscation
- Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
- A Rigorous Subexponential Algorithm For Computation of Class Groups
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Efficient quantum algorithms for computing class groups and solving the principal ideal problem in arbitrary degree number fields
- CSIDH on the Surface
- A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- Theory of Cryptography
- On quantum algorithms for noncommutative hidden subgroups
- Discrete logarithm problems with auxiliary inputs
- Password-authenticated key exchange from group actions
- Group action key encapsulation and non-interactive key exchange in the QROM
- Full quantum equivalence of group action DLog and CDH, and more
- Redeeming reset indifferentiability and applications to post-quantum security
- To label, or not to label (in generic groups)
This page was built for publication: Generic models for group actions