VSS from distributed ZK proofs and applications

S Atapoor, K Baghery, D Cozzo, R Pedersen - International Conference on …, 2023 - Springer
Abstract Non-Interactive Verifiable Secret Sharing (NI-VSS) is a technique for distributing a
secret among a group of individuals in a verifiable manner, such that shareholders can verify …

CSI-SharK: CSI-FiSh with sharing-friendly keys

S Atapoor, K Baghery, D Cozzo, R Pedersen - Australasian Conference on …, 2023 - Springer
CSI-FiSh is one of the most efficient isogeny-based signature schemes, which is proven to
be secure in the Quantum Random Oracle Model (QROM). However, there is a bottleneck in …

Cutting the grass: threshold group action signature schemes

M Battagliola, G Borin, A Meneghetti… - Cryptographers' Track at …, 2024 - Springer
Group actions are fundamental mathematical tools, with a long history of use in
cryptography. Indeed, the action of finite groups at the basis of the discrete logarithm …

Round-Robin is Optimal: Lower Bounds for Group Action Based Protocols

D Cozzo, E Giunta - Theory of Cryptography Conference, 2023 - Springer
An hard homogeneous space (HHS) is a finite group acting on a set with the group action
being hard to invert and the set lacking any algebraic structure. As such HHS could …

Practical robust DKG protocols for CSIDH

S Atapoor, K Baghery, D Cozzo, R Pedersen - International Conference on …, 2023 - Springer
Abstract A Distributed Key Generation (DKG) protocol is an essential component of
threshold cryptography. DKGs enable a group of parties to generate a secret and public key …

New Proof Systems and an OPRF from CSIDH

C Delpech de Saint Guilhem, R Pedersen - IACR International Conference …, 2024 - Springer
Isogeny computations in CSIDH (Asiacrypt 2018) are described using a commutative group
G acting on the set of supersingular elliptic curves. The commutativity property gives CSIDH …

An isogeny-based ID protocol using structured public keys

K Baghery, D Cozzo, R Pedersen - IMA International Conference on …, 2021 - Springer
Isogeny-based cryptography is known as one of the promising approaches to the emerging
post-quantum public key cryptography. In cryptography, an IDentification (ID) protocol is a …

Faster proofs and VRFs from isogenies

S Levin, R Pedersen - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We improve recent generic proof systems for isogeny knowledge by Cong, Lai, Levin [26]
based on circuit satisfiability, by using radical isogeny descriptions [19, 20] to prove a path in …

On actively secure fine-grained access structures from isogeny assumptions

F Campos, P Muth - International Conference on Post-Quantum …, 2022 - Springer
We present an actively secure threshold scheme in the setting of Hard Homogeneous
Spaces (HHS) which allows fine-grained access structures. More precisely, we elevate a …

[PDF][PDF] Lattice Isomorphism as a Group Action and Hard Problems on Quadratic Forms.

A Budroni, JJ Chi-Domínguez… - IACR Cryptol. ePrint Arch., 2023 - iacr.steepath.eu
Group actions have been used as a foundation in Public-key Cryptography to provide a
framework for hard problems and assumptions. In this work we formalize the Lattice …