Basso, Andrea and Chen, Mingjie and Fouotsa, Tako Boris and Kutas, Péter and Laval, Abel and Marco, Laurane and Saah, Gustave Tchoffo (2024) Exploring SIDH-Based Signature Parameters. In: Applied Cryptography and Network Security. Lecture Notes in Computer Science (14583). Springer Nature Switzerland AG, Cham, pp. 432-456. ISBN 9783031547690; 9783031547706
![]() |
Text
2023-1906.pdf Restricted to Registered users only Download (595kB) | Request a copy |
Abstract
Isogeny-based cryptography is an instance of post-quantum cryptography whose fundamental problem consists of finding an isogeny between two (isogenous) elliptic curves E and E′. This problem is closely related to that of computing the endomorphism ring of an elliptic curve. Therefore, many isogeny-based protocols require the endomorphism ring of at least one of the curves involved to be unknown. In this paper, we explore the design of isogeny based protocols in a scenario where one assumes that the endomorphism ring of all the curves are public. In particular, we identify digital signatures based on proof of isogeny knowledge from SIDH squares as such a candidate. We explore the design choices for such constructions and propose two variants with practical instantiations. We analyze their security according to three lines, the first consists of attacks based on KLPT with both polynomial and superpolynomial adversary, the second consists of attacks derived from the SIDH attacks and finally we study the zero-knowledge property of the underlying proof of knowledge.
Item Type: | Book Section |
---|---|
Subjects: | Q Science / természettudomány > QA Mathematics / matematika Q Science / természettudomány > QA Mathematics / matematika > QA75 Electronic computers. Computer science / számítástechnika, számítógéptudomány |
SWORD Depositor: | MTMT SWORD |
Depositing User: | MTMT SWORD |
Date Deposited: | 23 Sep 2024 07:46 |
Last Modified: | 23 Sep 2024 07:46 |
URI: | https://real.mtak.hu/id/eprint/205436 |
Actions (login required)
![]() |
Edit Item |