Mathematics of isogeny based cryptography

L De Feo - arXiv preprint arXiv:1711.04062, 2017 - arxiv.org
These lectures notes were written for a summer school on Mathematics for post-quantum
cryptography in Thi\es, Senegal. They try to provide a guide for Masters' students to get …

Weak instances of class group action based cryptography via self-pairings

W Castryck, M Houben, SP Merz, M Mula… - Annual International …, 2023 - Springer
In this paper we study non-trivial self-pairings with cyclic domains that are compatible with
isogenies between elliptic curves oriented by an imaginary quadratic order O. We prove that …

CSI-otter: Isogeny-based (partially) blind signatures from the class group action with a twist

S Katsumata, YF Lai, JT LeGrow, L Qin - Designs, Codes and …, 2024 - Springer
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature
scheme. While at a high level the scheme resembles the Schnorr blind signature, our work …

New SIDH countermeasures for a more efficient key exchange

A Basso, TB Fouotsa - International Conference on the Theory and …, 2023 - Springer
Abstract The Supersingular Isogeny Diffie-Hellman (SIDH) protocol has been the main and
most efficient isogeny-based encryption protocol, until a series of breakthroughs led to a …

Full quantum equivalence of group action DLog and CDH, and more

H Montgomery, M Zhandry - Journal of Cryptology, 2024 - Springer
Cryptographic group actions are a relaxation of standard cryptographic groups that have
less structure. This lack of structure allows them to be plausibly quantum resistant despite …

SCALLOP-HD: group action from 2-dimensional isogenies

M Chen, A Leroux, L Panny - IACR International Conference on Public …, 2024 - Springer
We present SCALLOP-HD, a novel group action that builds upon the recent SCALLOP
group action introduced by De Feo, Fouotsa, Kutas, Leroux, Merz, Panny and Wesolowski in …

VSS from distributed ZK proofs and applications

S Atapoor, K Baghery, D Cozzo, R Pedersen - International Conference on …, 2023 - Springer
Abstract Non-Interactive Verifiable Secret Sharing (NI-VSS) is a technique for distributing a
secret among a group of individuals in a verifiable manner, such that shareholders can verify …

OPRFs from isogenies: designs and analysis

L Heimberger, T Hennerbichler, F Meisingseth… - Proceedings of the 19th …, 2024 - dl.acm.org
Oblivious Pseudorandom Functions (OPRFs) are an elementary building block in
cryptographic and privacy-preserving applications. While there are numerous pre-quantum …

Isogeny problems with level structure

L De Feo, TB Fouotsa, L Panny - … on the Theory and Applications of …, 2024 - Springer
Given two elliptic curves and the degree of an isogeny between them, finding the isogeny is
believed to be a difficult problem—upon which rests the security of nearly any isogeny …

Introducing Clapoti (s): Evaluating the isogeny class group action in polynomial time

A Page, D Robert - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this short note, we present a simplified (but slower) version Clapoti of Clapotis, whose full
description will appear later. Let 𝐸/𝔽_𝑞 be an elliptic curve with an effective primitive …