Password-authenticated key exchange from group actions

M Abdalla, T Eisenhofer, E Kiltz, S Kunzweiler… - Annual International …, 2022 - Springer
We present two provably secure password-authenticated key exchange (PAKE) protocols
based on a commutative group action. To date the most important instantiation of isogeny …

Generic models for group actions

J Duman, D Hartmann, E Kiltz, S Kunzweiler… - … Conference on Public …, 2023 - Springer
Abstract We define the Generic Group Action Model (GGAM), an adaptation of the Generic
Group Model to the setting of group actions (such as CSIDH). Compared to a previously …

Group action key encapsulation and non-interactive key exchange in the QROM

J Duman, D Hartmann, E Kiltz, S Kunzweiler… - … Conference on the …, 2022 - Springer
In the context of quantum-resistant cryptography, cryptographic group actions offer an
abstraction of isogeny-based cryptography in the Commutative Supersingular Isogeny Diffie …

Modeling CSIKE Algorithm on Non-Cyclic Edwards Curves

A Bessalov, V Sokolov, P Skladannyi… - … in Information and …, 2022 - elibrary.kubg.edu.ua
An original key encapsulation scheme is proposed as a modification of the CSIDH algorithm
built on the isogenies of non-cyclic Edwards curves. The corresponding CSIKE algorithm …

CSIKE-ENC Combined Encryption Scheme with Optimized Degrees of Isogeny Distribution

A Bessalov, S Abramov, V Sokolov… - … Providing in Information …, 2023 - elibrary.kubg.edu.ua
For the PQC CSIDH and CSIKE algorithms, the advantages of two classes of quadratic and
twisted supersingular Edwards curves over complete Edwards curves are justified. These …

Post-Quantum Multi-Recipient Public Key Encryption

J Alwen, D Hartmann, E Kiltz, M Mularczyk… - Proceedings of the …, 2023 - dl.acm.org
A multi-message multi-recipient PKE (mmPKE) encrypts a batch of messages, in one go, to a
corresponding set of independently chosen receiver public keys. The resulting''multi …

Solving the Hidden Number Problem for CSIDH and CSURF via Automated Coppersmith

J Meers, J Nowakowski - International Conference on the Theory and …, 2023 - Springer
We define and analyze the Commutative Isogeny Hidden Number Problem which is the
natural analogue of the Hidden Number Problem in the CSIDH and CSURF setting. In short …

Post-quantum anonymous one-sided authenticated key exchange without random oracles

R Ishibashi, K Yoneyama - IACR International Conference on Public-Key …, 2022 - Springer
Abstract Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common
session key among multiple parties. Usually, PKI-based AKE schemes are designed to …

An efficient post-quantum KEM from CSIDH

M Qi - Journal of Mathematical Cryptology, 2022 - degruyter.com
The SIDH and CSIDH are now the two most well-known post-quantum key exchange
protocols from the supersingular isogeny-based cryptography, which have attracted much …

Robustly Reusable Fuzzy Extractor from Isogeny

Y Zhou, S Liu, S Han - Theoretical Computer Science, 2024 - Elsevier
Abstract Robustly reusable Fuzzy Extractor (rrFE) allows multiple extractions from the same
fuzzy source in a reproducible way. The reusability of rrFE asks the pseudo-randomness of …