Mathematics of isogeny based cryptography
L De Feo - arXiv preprint arXiv:1711.04062, 2017 - arxiv.org
These lectures notes were written for a summer school on Mathematics for post-quantum
cryptography in Thi\es, Senegal. They try to provide a guide for Masters' students to get …
cryptography in Thi\es, Senegal. They try to provide a guide for Masters' students to get …
Weak instances of class group action based cryptography via self-pairings
In this paper we study non-trivial self-pairings with cyclic domains that are compatible with
isogenies between elliptic curves oriented by an imaginary quadratic order O. We prove that …
isogenies between elliptic curves oriented by an imaginary quadratic order O. We prove that …
CSI-otter: Isogeny-based (partially) blind signatures from the class group action with a twist
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature
scheme. While at a high level the scheme resembles the Schnorr blind signature, our work …
scheme. While at a high level the scheme resembles the Schnorr blind signature, our work …
New SIDH countermeasures for a more efficient key exchange
A Basso, TB Fouotsa - International Conference on the Theory and …, 2023 - Springer
Abstract The Supersingular Isogeny Diffie-Hellman (SIDH) protocol has been the main and
most efficient isogeny-based encryption protocol, until a series of breakthroughs led to a …
most efficient isogeny-based encryption protocol, until a series of breakthroughs led to a …
Full quantum equivalence of group action DLog and CDH, and more
H Montgomery, M Zhandry - Journal of Cryptology, 2024 - Springer
Cryptographic group actions are a relaxation of standard cryptographic groups that have
less structure. This lack of structure allows them to be plausibly quantum resistant despite …
less structure. This lack of structure allows them to be plausibly quantum resistant despite …
SCALLOP-HD: group action from 2-dimensional isogenies
We present SCALLOP-HD, a novel group action that builds upon the recent SCALLOP
group action introduced by De Feo, Fouotsa, Kutas, Leroux, Merz, Panny and Wesolowski in …
group action introduced by De Feo, Fouotsa, Kutas, Leroux, Merz, Panny and Wesolowski in …
VSS from distributed ZK proofs and applications
Abstract Non-Interactive Verifiable Secret Sharing (NI-VSS) is a technique for distributing a
secret among a group of individuals in a verifiable manner, such that shareholders can verify …
secret among a group of individuals in a verifiable manner, such that shareholders can verify …
OPRFs from isogenies: designs and analysis
L Heimberger, T Hennerbichler, F Meisingseth… - Proceedings of the 19th …, 2024 - dl.acm.org
Oblivious Pseudorandom Functions (OPRFs) are an elementary building block in
cryptographic and privacy-preserving applications. While there are numerous pre-quantum …
cryptographic and privacy-preserving applications. While there are numerous pre-quantum …
Isogeny problems with level structure
Given two elliptic curves and the degree of an isogeny between them, finding the isogeny is
believed to be a difficult problem—upon which rests the security of nearly any isogeny …
believed to be a difficult problem—upon which rests the security of nearly any isogeny …
Introducing Clapoti (s): Evaluating the isogeny class group action in polynomial time
A Page, D Robert - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this short note, we present a simplified (but slower) version Clapoti of Clapotis, whose full
description will appear later. Let 𝐸/𝔽_𝑞 be an elliptic curve with an effective primitive …
description will appear later. Let 𝐸/𝔽_𝑞 be an elliptic curve with an effective primitive …