File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Authenticated key exchange from supersingular isogeny

TitleAuthenticated key exchange from supersingular isogeny
Authors
KeywordsAuthenticated key exchange
Post quantum
Supersingular elliptic curve isogeny
Issue Date2018
Citation
Journal of Cryptologic Research, 2018, v. 5, n. 6, p. 695-704 How to Cite?
AbstractThis paper studies the supersingular isogeny cryptosystem, a new promising post-quantum cryptosystem, and proposes a provably secure two-pass authenticated key exchange protocol over supersingular isogeny cryptosystems inspired by twin Diffie-Hellman problems. The proposed protocol is also an MQV-style protocol, hence it inherits sound properties of (H)MQV protocol. The security of the proposed protocol is based on the hardness of computing isogenies between supersingular elliptic curves. This paper gives heuristic arguments about the security properties, and formally proves its security in the authenticated-links adversarial model of Canetti-Krawczyk. To prove the security, a twin version of supersingular isogeny assumption is proposed. Compared with the lattice-based schemes, the proposed protocol has smaller keys and larger computation.
Persistent Identifierhttp://hdl.handle.net/10722/311945
ISSN
2023 SCImago Journal Rankings: 0.191

 

DC FieldValueLanguage
dc.contributor.authorXu, Xiu-
dc.contributor.authorLi, Bao-
dc.contributor.authorWang, Kun Peng-
dc.contributor.authorXue, Hai Yang-
dc.date.accessioned2022-04-06T04:31:49Z-
dc.date.available2022-04-06T04:31:49Z-
dc.date.issued2018-
dc.identifier.citationJournal of Cryptologic Research, 2018, v. 5, n. 6, p. 695-704-
dc.identifier.issn2095-7025-
dc.identifier.urihttp://hdl.handle.net/10722/311945-
dc.description.abstractThis paper studies the supersingular isogeny cryptosystem, a new promising post-quantum cryptosystem, and proposes a provably secure two-pass authenticated key exchange protocol over supersingular isogeny cryptosystems inspired by twin Diffie-Hellman problems. The proposed protocol is also an MQV-style protocol, hence it inherits sound properties of (H)MQV protocol. The security of the proposed protocol is based on the hardness of computing isogenies between supersingular elliptic curves. This paper gives heuristic arguments about the security properties, and formally proves its security in the authenticated-links adversarial model of Canetti-Krawczyk. To prove the security, a twin version of supersingular isogeny assumption is proposed. Compared with the lattice-based schemes, the proposed protocol has smaller keys and larger computation.-
dc.languageeng-
dc.relation.ispartofJournal of Cryptologic Research-
dc.subjectAuthenticated key exchange-
dc.subjectPost quantum-
dc.subjectSupersingular elliptic curve isogeny-
dc.titleAuthenticated key exchange from supersingular isogeny-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.13868/j.cnki.jcr.000277-
dc.identifier.scopuseid_2-s2.0-85095827282-
dc.identifier.volume5-
dc.identifier.issue6-
dc.identifier.spage695-
dc.identifier.epage704-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats