J Duman, D Hartmann, E Kiltz, S Kunzweiler… - … Conference on Public …, 2023 - Springer
Abstract We define the Generic Group Action Model (GGAM), an adaptation of the Generic Group Model to the setting of group actions (such as CSIDH). Compared to a previously …
J Duman, D Hartmann, E Kiltz, S Kunzweiler… - … Conference on the …, 2022 - Springer
In the context of quantum-resistant cryptography, cryptographic group actions offer an abstraction of isogeny-based cryptography in the Commutative Supersingular Isogeny Diffie …
A Bessalov, V Sokolov, P Skladannyi… - … in Information and …, 2022 - elibrary.kubg.edu.ua
An original key encapsulation scheme is proposed as a modification of the CSIDH algorithm built on the isogenies of non-cyclic Edwards curves. The corresponding CSIKE algorithm …
A Bessalov, S Abramov, V Sokolov… - … Providing in Information …, 2023 - elibrary.kubg.edu.ua
For the PQC CSIDH and CSIKE algorithms, the advantages of two classes of quadratic and twisted supersingular Edwards curves over complete Edwards curves are justified. These …
J Alwen, D Hartmann, E Kiltz, M Mularczyk… - Proceedings of the …, 2023 - dl.acm.org
A multi-message multi-recipient PKE (mmPKE) encrypts a batch of messages, in one go, to a corresponding set of independently chosen receiver public keys. The resulting''multi …
J Meers, J Nowakowski - International Conference on the Theory and …, 2023 - Springer
We define and analyze the Commutative Isogeny Hidden Number Problem which is the natural analogue of the Hidden Number Problem in the CSIDH and CSURF setting. In short …
R Ishibashi, K Yoneyama - IACR International Conference on Public-Key …, 2022 - Springer
Abstract Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common session key among multiple parties. Usually, PKI-based AKE schemes are designed to …
M Qi - Journal of Mathematical Cryptology, 2022 - degruyter.com
The SIDH and CSIDH are now the two most well-known post-quantum key exchange protocols from the supersingular isogeny-based cryptography, which have attracted much …
Y Zhou, S Liu, S Han - Theoretical Computer Science, 2024 - Elsevier
Abstract Robustly reusable Fuzzy Extractor (rrFE) allows multiple extractions from the same fuzzy source in a reproducible way. The reusability of rrFE asks the pseudo-randomness of …