A faster software implementation of SQISign

K Lin, W Wang, Z Xu, CA Zhao - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Isogeny-based cryptography is famous for its short key size. As one of the most compact
digital signatures, SQIsign (Short Quaternion and Isogeny Signature) is attractive among …

VSS from distributed ZK proofs and applications

S Atapoor, K Baghery, D Cozzo, R Pedersen - International Conference on …, 2023 - Springer
Abstract Non-Interactive Verifiable Secret Sharing (NI-VSS) is a technique for distributing a
secret among a group of individuals in a verifiable manner, such that shareholders can verify …

Round-Robin is Optimal: Lower Bounds for Group Action Based Protocols

D Cozzo, E Giunta - Theory of Cryptography Conference, 2023 - Springer
An hard homogeneous space (HHS) is a finite group acting on a set with the group action
being hard to invert and the set lacking any algebraic structure. As such HHS could …

Efficient isogeny proofs using generic techniques

K Cong, YF Lai, S Levin - … on Applied Cryptography and Network Security, 2023 - Springer
Generating supersingular elliptic curves of unknown endomorphism ring has been a
problem vexing isogeny-based cryptographers for several years. A recent development has …

Practical robust DKG protocols for CSIDH

S Atapoor, K Baghery, D Cozzo, R Pedersen - International Conference on …, 2023 - Springer
Abstract A Distributed Key Generation (DKG) protocol is an essential component of
threshold cryptography. DKGs enable a group of parties to generate a secret and public key …

New Proof Systems and an OPRF from CSIDH

C Delpech de Saint Guilhem, R Pedersen - IACR International Conference …, 2024 - Springer
Isogeny computations in CSIDH (Asiacrypt 2018) are described using a commutative group
G acting on the set of supersingular elliptic curves. The commutativity property gives CSIDH …

Efficient post-quantum secure deterministic threshold wallets from isogenies

P Das, A Erwig, M Meyer, P Struck - Proceedings of the 19th ACM Asia …, 2024 - dl.acm.org
Cryptocurrency networks crucially rely on digital signature schemes, which are used as an
authentication mechanism for transactions. Unfortunately, most major cryptocurrencies …

Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation

A Zawia, MA Hasan - International Conference on Information Security, 2024 - Springer
In the realm of post-quantum cryptography, the Commutative Supersingular Isogeny Diffie-
Hellman (CSIDH) has drawn considerable attention since its proposal at Asiacrypt 2018 …

Compact Stateful Deterministic Wallet from Isogeny-Based Signature Featuring Uniquely Rerandomizable Public Keys

S Shaw, R Dutta - International Conference on Cryptology and Network …, 2023 - Springer
Deterministic wallets are promising cryptographic primitives that are employed in
cryptocurrencies to safeguard user's fund. In CCS'19, a generic construction of deterministic …

Identity-based threshold signatures from isogenies

S Atapoor - IMA International Conference on Cryptography and …, 2023 - Springer
The identity-based signature, initially introduced by Shamir, plays a fundamental role in the
domain of identity-based cryptography. It offers the capability to generate a signature on a …