REAL

Exploring SIDH-Based Signature Parameters

Basso, Andrea and Chen, Mingjie and Fouotsa, Tako Boris and Kutas, Péter and Laval, Abel and Marco, Laurane and Saah, Gustave Tchoffo (2024) Exploring SIDH-Based Signature Parameters. In: Applied Cryptography and Network Security. Lecture Notes in Computer Science (14583). Springer Nature Switzerland AG, Cham, pp. 432-456. ISBN 9783031547690; 9783031547706

[img] Text
2023-1906.pdf
Restricted to Registered users only

Download (595kB) | Request a copy

Abstract

Isogeny-based cryptography is an instance of post-quantum cryptography whose fundamental problem consists of finding an isogeny between two (isogenous) elliptic curves E and E′. This problem is closely related to that of computing the endomorphism ring of an elliptic curve. Therefore, many isogeny-based protocols require the endomorphism ring of at least one of the curves involved to be unknown. In this paper, we explore the design of isogeny based protocols in a scenario where one assumes that the endomorphism ring of all the curves are public. In particular, we identify digital signatures based on proof of isogeny knowledge from SIDH squares as such a candidate. We explore the design choices for such constructions and propose two variants with practical instantiations. We analyze their security according to three lines, the first consists of attacks based on KLPT with both polynomial and superpolynomial adversary, the second consists of attacks derived from the SIDH attacks and finally we study the zero-knowledge property of the underlying proof of knowledge.

Item Type: Book Section
Subjects: Q Science / természettudomány > QA Mathematics / matematika
Q Science / természettudomány > QA Mathematics / matematika > QA75 Electronic computers. Computer science / számítástechnika, számítógéptudomány
SWORD Depositor: MTMT SWORD
Depositing User: MTMT SWORD
Date Deposited: 23 Sep 2024 07:46
Last Modified: 23 Sep 2024 07:46
URI: https://real.mtak.hu/id/eprint/205436

Actions (login required)

Edit Item Edit Item