Password-authenticated key exchange from group actions

M Abdalla, T Eisenhofer, E Kiltz, S Kunzweiler… - Annual International …, 2022 - Springer
We present two provably secure password-authenticated key exchange (PAKE) protocols
based on a commutative group action. To date the most important instantiation of isogeny …

How not to create an isogeny-based PAKE

R Azarderakhsh, D Jao, B Koziel, JT LeGrow… - … and Network Security …, 2020 - Springer
Isogeny-based key establishment protocols are believed to be resistant to quantum
cryptanalysis. Two such protocols—supersingular isogeny Diffie-Hellman (SIDH) and …

NICE-PAKE: On the Security of KEM-Based PAKE Constructions without Ideal Ciphers

N Alnahawi, J Alperin-Sheriff, D Apon… - Cryptology ePrint …, 2024 - eprint.iacr.org
The interest in realizing generic PQC KEM-based PAKEs has increased significantly in the
last few years. One such PAKE is the CAKE protocol, proposed by Beguinet et al.(ACNS'23) …

Towards post-quantum secure PAKE-A tight security proof for OCAKE in the BPR model

N Alnahawi, K Hövelmanns, A Hülsing… - … Conference on Cryptology …, 2024 - Springer
Abstract We revisit OCAKE (ACNS 23), a generic recipe that constructs password-based
authenticated key exchange (PAKE) from key encapsulation mechanisms (KEMs), to allow …

同源密码方案综述

刘一丹, 程庆丰 - Journal of Cryptologic Research, 2023 - search.proquest.com
基于超奇异椭圆曲线同源构造的密码体制作为后量子密码的重要分支, 因其较小的密钥尺寸和
良好的抗量子特性, 成为一个很有潜力的发展方向. 本文对同源密码进行了简要概述 …

Review of chosen isogeny-based cryptographic schemes

B Drzazga, Ł Krzywiecki - Cryptography, 2022 - mdpi.com
Public-key cryptography provides security for digital systems and communication. Traditional
cryptographic solutions are constantly improved, eg, to suppress brute-force attacks …

CPAKE: An Identity-Binding Password Authenticated Key Exchange from Quasi-cyclic Codes

P Jana, R Dutta - International Conference on Cryptology in India, 2024 - Springer
Passwords are commonly used for authentication, but their susceptibility to brute force and
dictionary attacks poses a significant risk. To mitigate this issue, Password Authenticated …

Authentication and key establishment protocol from supersingular isogeny for mobile environments

M Qi, J Chen - The Journal of Supercomputing, 2022 - Springer
This paper presents a provably secure post-quantum authentication and key establishment
protocol for mobile environments, which is the first one from supersingular isogeny to our …

Compact Password Authenticated Key Exchange from Group Actions

R Ishibashi, K Yoneyama - Australasian Conference on Information …, 2023 - Springer
At ASIACRYPT 2020, Alamati et al. formalized the framework of group actions for abstracting
isogeny-based cryptosystems. At CRYPTO 2022, Abdalla et al. extended the framework to …

[PDF][PDF] Review of Chosen Isogeny-Based Cryptographic Schemes. Cryptography 2022, 6, 27

B Drzazga, Ł Krzywiecki - 2022 - academia.edu
Public-key cryptography provides security for digital systems and communication. Traditional
cryptographic solutions are constantly improved, eg, to suppress brute-force attacks …