Filters








97 Hits in 4.0 sec

Efficient Compression of SIDH Public Keys [chapter]

Craig Costello, David Jao, Patrick Longa, Michael Naehrig, Joost Renes, David Urbanik
2017 Lecture Notes in Computer Science  
In this paper, we propose a range of new algorithms and techniques that accelerate SIDH public-key compression by more than an order of magnitude, making it roughly as fast as a round of standalone SIDH  ...  key exchange, while further reducing the size of the compressed public keys by approximately 12.5%.  ...  We thank Drew Sutherland for his helpful discussions concerning the optimization of the Pohlig-Hellman algorithm, and the anonymous Eurocrypt reviewers for their useful comments.  ... 
doi:10.1007/978-3-319-56620-7_24 fatcat:teoo6yb5n5crbdso4rrztk3fna

Efficient Algorithms for Supersingular Isogeny Diffie-Hellman [chapter]

Craig Costello, Patrick Longa, Michael Naehrig
2016 Lecture Notes in Computer Science  
The size of public keys is only 751 bytes, which is significantly smaller than most of the popular post-quantum key exchange alternatives.  ...  We propose a new suite of algorithms that significantly improve the performance of supersingular isogeny Diffie-Hellman (SIDH) key exchange.  ...  The speed of our software (and the size of the public keys it generates) highlights the potential that SIDH currently offers as a candidate for post-quantum key exchange.  ... 
doi:10.1007/978-3-662-53018-4_21 fatcat:p2zqtbzorjbvpcpyf7gyh2eicq

SIDH-sign: an efficient SIDH PoK-based signature [article]

Jesús-Javier Chi-Domínguez, Víctor Mateu, Lucas Pandolfo Perin
2022 IACR Cryptology ePrint Archive  
We analyze and implement the SIDH PoK-based construction from De Feo, Dobson, Galbraith, and Zobernigl. We improve the SIDH-PoK built-in functions to allow an efficient constant-time implementation.  ...  To the best of our knowledge, the three proposed instances provide the best performance among digital signature schemes based on isogenies.  ...  Similarly, using the compressed SIDH-keys to reduce the signature sizes increase the timings of SIDH-sign.  ... 
dblp:journals/iacr/Chi-DominguezMP22 fatcat:mqcvtreekbe5jeobf2qt6m2wwi

Faster Public-key Compression of SIDH with Less Memory [article]

Kaizhan Lin, Jianming Lin, Weize Wang, Chang-An Zhao
2021 IACR Cryptology ePrint Archive  
In this paper, we mainly improve the performance of the public-key compression of SIDH, especially the efficiency and the storage of pairing computation involved.  ...  However, compared to other post-quantum protocols, the computational cost of SIDH is relatively high, and so is the public-key compression.  ...  Public-key compression of SIDH In Remark 1 we can see that the size of the public key is 6log 2 p bits.  ... 
dblp:journals/iacr/LinLWZ21 fatcat:avlibzfmzjf2zbfgbxcg6pgmqi

An Alternative Approach for Computing Discrete Logarithms in Compressed SIDH [article]

Kaizhan Lin and Weize Wang and Lin Wang and Chang-An Zhao
2021 arXiv   pre-print
Currently, public-key compression of supersingular isogeny Diffie-Hellman (SIDH) and its variant, supersingular isogeny key encapsulation (SIKE) involve pairing computation and discrete logarithm computation  ...  Our implementation shows that the efficiency of our algorithms is close to that of the previous work, and our algorithms perform better in some special cases.  ...  The work of Chang-An Zhao is partially supported by NSFC under Grant No. 61972428 and by the Major Program of Guangdong Basic and Applied Research under Grant No. 2019B030302008.  ... 
arXiv:2111.10226v2 fatcat:y5zppwqif5hink3silyud7uthm

Post-Quantum Cryptography Algorithms Standardization and Performance Analysis [article]

Manish Kumar
2022 arXiv   pre-print
The practical quantum computers, when available with millions of qubits capacity, will be able to break nearly all modern public-key cryptographic systems.  ...  Most of the quantum-safe algorithms need more CPU cycles, higher runtime memory, and large key size.  ...  -compressed 197 350 SIDH-p503 378 32 SIDH-p503-compressed 225 32 2 SIKE-p503 378 434 1 SIKE Alternates SIKE-p503-compressed 225 407 Key Encapsulation SIDH-p610 462 39 Mechanisms 3 SIDH-p610-compressed  ... 
arXiv:2204.02571v1 fatcat:3khslj5ejbafzf27nk6ztywbi4

Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves [article]

Suhri Kim
2021 IACR Cryptology ePrint Archive  
From our implementation, the performance of Huff-SIDH and Montgomery-SIDH is almost the same, and the performance of Huff-CSIDH is 6% faster than Montgomery-CSIDH.  ...  In this regard, we first investigate the computational cost of the building blocks when compression functions are used for Huff curves.  ...  Hence φ A (P B − Q B ) and φ B (P A − Q A ) are also computed and exchanged to compute the shared secret key efficiently. This can be thought of as an increase in the public key size.  ... 
dblp:journals/iacr/Kim21 fatcat:gdjsmhqtwrgozdmsnm63sf2kgm

Faster Key Generation of Supersingular Isogeny Diffie-Hellman

Kaizhan LIN, Fangguo ZHANG, Chang-An ZHAO
2022 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
Supersingular isogeny Diffie-Hellman (SIDH) is attractive for its relatively small public key size, but it is still unsatisfactory due to its efficiency, compared to other post-quantum proposals.  ...  In this paper, we focus on the performance of SIDH when the starting curve is 𝐸 6 : Inspired by the previous work [1, 2], we present several tricks to accelerate key generation of SIDH and each process  ...  This work is supported by Guangdong Major Project of Basic and Applied Basic Research (No. 2019B030302008), the National Natural Science Foundation of China (No.s 61972429 and 61972428).  ... 
doi:10.1587/transfun.2022eap1026 fatcat:3xuc4iykxveqroa52py2istv2e

Authenticated key exchange for SIDH [article]

Steven D. Galbraith
2018 IACR Cryptology ePrint Archive  
We survey authenticated key exchange (AKE) in the context of supersingular isogeny Diffie-Hellman key exchange (SIDH).  ...  We explain some challenges that arise in the SIDH setting if one wants to do a "Diffie-Hellman-like" AKE, and present several candidate authenticated key exchange protocols suitable for SIDH.  ...  Give more efficient solutions to public key validation for SIDH keys. (This is probably equivalent to more efficient isogeny signatures.) 4.  ... 
dblp:journals/iacr/Galbraith18 fatcat:nb66jk73czd5fpxnhzwj5tpibe

Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies [article]

Kazuki Yoneyama
2019 IACR Cryptology ePrint Archive  
The key size and the ciphertext overhead of our schemes are smaller than these of SIKE, which is submitted to NIST's post-quantum cryptosystems standardization, for current security analyses.  ...  The main advantage of our schemes are compactness.  ...  Moreover, validity of public keys can be efficiently verified while SIDH has no efficient method yet. Hence, CSIDH is very compatible to classical DH.  ... 
dblp:journals/iacr/Yoneyama19 fatcat:cgcfeo3i2ff4riut4b4iioepi4

A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies [article]

Patrick Longa
2018 IACR Cryptology ePrint Archive  
(SIDH) and Supersingular Isogeny Key Encapsulation (SIKE) protocols as basic building blocks to construct efficient and flexible authenticated key exchange schemes featuring different functionalities  ...  In this work, we study several post-quantum authenticated key exchange protocols in the setting of supersingular isogenies.  ...  The author would like to thank Michael Naehrig for his comments on an earlier version of this paper.  ... 
dblp:journals/iacr/Longa18 fatcat:7wlfszlt2zd7njgeytgu7tvmzm

Towards Post-Quantum Updatable Public-Key Encryption via Supersingular Isogenies [article]

Edward Eaton, David Jao, Chelsea Komlo
2020 IACR Cryptology ePrint Archive  
In this work, we present the first post-quantum secure Updatable Public-Key Encryption (UPKE) construction.  ...  representation to prevent leakage of secret keys.  ...  We thank Richard Barnes for his help in understanding the forward secrecy limitations of TreeKEM and details of the MLS protocol in general.  ... 
dblp:journals/iacr/EatonJK20 fatcat:c4wpeb7f3jfn3nnf4vbou2cfvi

PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security

Tyler Cultice, Himanshu Thapliyal
2022 Information  
However, standard CAN's efficiency and payload sizes are too small for post-quantum cryptography.  ...  As vehicles can have lifespans of multiple decades, post-quantum cryptosystems are essential for protecting the vehicle communication systems from quantum attacks.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/info13080382 fatcat:z6hho7resbczfoertx6ekz2wve

Post-Quantum Static-Static Key Agreement Using Multiple Protocol Instances [chapter]

Reza Azarderakhsh, David Jao, Christopher Leonardi
2017 Lecture Notes in Computer Science  
Some key agreement protocols leak information about secret keys if dishonest participants use specialized public keys.  ...  Simply put, each party generates k different keys, and two parties perform key agreement using all k 2 combinations of their individual keys.  ...  This work is also partially supported by NSERC, CryptoWorks21, and Public Works and Government Services Canada.  ... 
doi:10.1007/978-3-319-72565-9_3 fatcat:z5larb3xcrebtc7pn37wql4ehy

Faster Isogenies for Quantum-Safe SIKE [article]

Rami Elkhatib, Brian Koziel, Reza Azarderakhsh
2021 IACR Cryptology ePrint Archive  
Across each of these implementations, our new method achieves 10% and 5% speedups in SIKE's key encapsulation and decapsulation operations, respectively.  ...  The large-degree isogeny computation performs a series of isogenous mappings between curves, to account for about 80% of SIKE's latency.  ...  On the application side, we have seen the use of SIDH/SIKE public key compression [7, 14, 39, 40] , new isogeny-based digital signatures schemes [25, 49] , isogeny-based hybrid key exchange [15, 9]  ... 
dblp:journals/iacr/ElkhatibKA21 fatcat:pf3i23mznrgs5ijqwnthwn3uue
« Previous Showing results 1 — 15 out of 97 results