30 Hits in 7.6 sec

Towards Post-Quantum Updatable Public-Key Encryption via Supersingular Isogenies [article]

Edward Eaton, David Jao, Chelsea Komlo
2020 IACR Cryptology ePrint Archive  
In this work, we present the first post-quantum secure Updatable Public-Key Encryption (UPKE) construction.  ...  At a fundamental level, these variants differ in how encryption and decryption keys are updated, and consequently impact the design and security model for quantum-safe constructions.  ...  We thank Douglas Stebila for his review of our proof and suggestions on modeling an adaptive adversary that can both select update values and compromise a victim's local state.  ... 
dblp:journals/iacr/EatonJK20 fatcat:c4wpeb7f3jfn3nnf4vbou2cfvi

Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors [article]

Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, Matthew Campagna, David Jao
2019 IACR Cryptology ePrint Archive  
In this work, we present highly-optimized constant-time software libraries for Supersingular Isogeny Key Encapsulation (SIKE) protocol on ARMv8 processors.  ...  techniques, we are able to improve the performance of the entire protocol by the factor of 5× compared to optimized C implementations on 64-bit ARM highperformance cores, providing 83-, 124-, and 159-bit quantum-security  ...  Supersingular Isogeny Public-key Encryption In this section, we recall the public-key encryption method from the isogenies of supersingular elliptic curves which was first introduced in [17] , and it  ... 
dblp:journals/iacr/JalaliAKCJ19 fatcat:uibxavhcezgblmiyfzlbyyck6m

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

Chithralekha Balamurugan, Kalpana Singh, Ganeshvani Ganesan, Muttukrishnan Rajarajan
2021 Cryptography  
This threat triggered post-quantum cryptography research to design and develop post-quantum algorithms that can withstand quantum computing attacks.  ...  This paper provides an overview of the various research directions that have been explored in post-quantum cryptography and, specifically, the various code-based cryptography research dimensions that have  ...  Google [55] USA PQC products HRSS-SXY (variant of NTRU encryption) and SIKE (supersingular isogeny key exchange) Cloudfare Post-quantum cryptography˙encryption and signature methods for chrome browser  ... 
doi:10.3390/cryptography5040038 fatcat:wkb43zunwjagbnljc6brfou4ty

Mobile Energy Requirements of the Upcoming NIST Post-Quantum Cryptography Standards [article]

Markku-Juhani O. Saarinen
2020 arXiv   pre-print
Standardization of Post-Quantum Cryptography (PQC) was started by NIST in 2016 and has proceeded to its second elimination round.  ...  We relate computational (energy) costs of PQC algorithms to their data transmission costs which are expected to increase with new types of public keys and ciphertext messages.  ...  These remain the major groups of post-quantum algorithms 14 years later, with the addition of the isogeny problem of supersingular curves [3] , [4] .  ... 
arXiv:1912.00916v4 fatcat:ie2z75cgnjgpncgqbt2z5ydrtq

Quantum Computing: A Taxonomy, Systematic Review and Future Directions [article]

Sukhpal Singh Gill, Adarsh Kumar, Harvinder Singh, Manmeet Singh, Kamalpreet Kaur, Muhammad Usman, Rajkumar Buyya
2021 arXiv   pre-print
A detailed overview of quantum software tools and technologies, post-quantum cryptography and quantum computer hardware development to document the current state-of-the-art in the respective areas.  ...  Indeed, the demonstration of quantum supremacy marks a significant milestone in the Noisy Intermediate Scale Quantum (NISQ) era - the next logical step being the quantum advantage whereby quantum computers  ...  Three popular isogeny-based structures used in post-quantum cryptography include Ordinary Isogeny Diffie-Hellman (OIDH), Supersingular Isogeny DH (SIDH), and Commutative SIDH (CSIDH) [196] .  ... 
arXiv:2010.15559v4 fatcat:y6cuttww5fd5jdmvcer352lh4e

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
2021 IEEE Access  
Particularly, we emphasize on post-quantum cryptography techniques that may (or must when quantum computers become a reality) be used in the future through concrete products, pilots, and projects.  ...  Finally, we discuss the main challenges with respect to current PETs and highlight some future directions for developing their post-quantum counterparts.  ...  IBC schemes are usually key exchange protocols such as Supersingular Isogeny Diffie-Hellman (SIDH) [186] and Supersingular Isogeny Key Exchange (SIKE) [187] . • Lattice-Based • Symmetric Quantum-Resistant  ... 
doi:10.1109/access.2021.3062201 fatcat:kqcwwqjfjnds7bzlrid7r6gjlu

A Compact and Scalable Hardware/Software Co-design of SIKE

Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina
2020 Transactions on Cryptographic Hardware and Embedded Systems  
We present efficient and compact hardware/software co-design implementations of the Supersingular Isogeny Key Encapsulation (SIKE) protocol on field-programmable gate arrays (FPGAs).  ...  Our results demonstrate that supersingular isogeny-based primitives such as SIDH and SIKE can indeed be deployed for embedded applications featuring competitive performance.  ...  Figure 1 : 1 Supersingular isogeny Diffie-Hellman key exchange (SIDH).  ... 
doi:10.13154/tches.v2020.i2.245-271 dblp:journals/tches/MassolinoLRB20 fatcat:2ysxgsa6hjcshfknto322kfmea

Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem [article]

Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia
2019 IACR Cryptology ePrint Archive  
key encapsulation (SIKE) protocol, that culminate in an improved classical cryptanalysis of the computational supersingular isogeny (CSSI) problem.  ...  We present a number of novel improvements, both to generic instantiations of the vOW algorithm finding collisions in arbitrary functions, and to its instantiation in the context of the supersingular isogeny  ...  encryption or key establishment proposals submitted to the post-quantum cryptography standardization process initiated by the U.S.  ... 
dblp:journals/iacr/CostelloLNRV19 fatcat:wf73vqxatndfrjyuiwcb444iwi

Quantum-safe trust for vehicles

CACM Staff
2021 Communications of the ACM  
And then you have algorithms like supersingular isogenies that have much smaller keys but run much slower.  ...  With the quantum-safe algorithms, you also have one public key that verifies the signatures, but the private key is very different.  ... 
doi:10.1145/3466174 fatcat:dd2qfi6kqbectkhzrrqvv5xpxu

A Candidate Group with Infeasible Inversion [article]

Salim Ali Altug, Yilei Chen
2018 IACR Cryptology ePrint Archive  
Later it was also shown to provide a broadcast encryption scheme by Irrer et al. (2004) .  ...  We initiate the study of computational problems on elliptic curve isogeny graphs defined over RSA moduli.  ...  Of course, by assuming the hardness of factorization, we immediately lose the post-quantum privilege of the "traditional" isogeny problems.  ... 
dblp:journals/iacr/AltugC18 fatcat:b3vk5isfnfftrn5bo2xh7fwtze

Hard isogeny problems over RSA moduli and groups with infeasible inversion [article]

Salim Ali Altug, Yilei Chen
2019 arXiv   pre-print
Later it was also shown to provide a broadcast encryption scheme by Irrer et al. (2004).  ...  We initiate the study of computational problems on elliptic curve isogeny graphs defined over RSA moduli.  ...  Whereas in our scheme we flip the public key and secret key, and change the encryption key accordingly.  ... 
arXiv:1810.00022v2 fatcat:s6ehpuorsnfflfo24kykcvckla

Survey of Promising Technologies for Quantum Drones and Networks

Adarsh Kumar, Surbhi Bhatia, Keshav Kaushik, Manjula Gandhi, Gayathri Devi, Diego Pacheco, Arwa Mashat
2021 IEEE Access  
Many efforts are made to propose a supersingular isogeny-based cryptography approach having a small key size.  ...  [239] discussed the basics of lattice-based cryptosystem and focused on NTRU public-key encryption approach.  ... 
doi:10.1109/access.2021.3109816 fatcat:gkyevfoqrfertef7j7gjzcstii

Group Signatures and Accountable Ring Signatures from Isogeny-based Assumptions [article]

Kai-Min Chung, Yao-Ching Hsieh, Mi-Ying Huang, Yu-Hsuan Huang, Tanja Lange, Bo-Yin Yang
2022 arXiv   pre-print
While there exist extensive works on constructing GS from various post-quantum assumptions, there has not been any research using isogeny-based assumptions.  ...  This work is also the first post-quantum ARS and GS that are proven QROM-secure.  ...  One natural approach to embed opening informa-tion is to encrypt the information with the master public key.  ... 
arXiv:2110.04795v2 fatcat:sbnvaykhrbgypk37dfofb2azpq

Ring learning with errors: a crossroads between post-quantum cryptography, machine learning and number theory

I. Blanco-Chacón
2020 Irish Mathematical Society Bulletin  
While there already exist post-quantum solutions for much of standard cryptography, like public key encryption and digital signature, it is currently unclear how some of the more elaborate protocols, like  ...  isogeny based cryptography ( [19] ), is a protocol for key exchange, analogous to Diffie-Hellman, but the cyclic groups present here are attached to supersingular elliptic curves defined over finite  ... 
doi:10.33232/bims.0086.17.46 fatcat:evfpgkhddrfgpbybayoolk2coa

Quantum Security of Cryptographic Primitives [article]

Tommaso Gagliardoni
2017 arXiv   pre-print
designed to be natively run on a quantum infrastructure, such as quantum key distribution).  ...  This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols  ...  A postquantum IND (pq-IND) adversary A for E is a pair of QPT algorithms Post-Quantum Public-Key Encryption In post-quantum public-key encryption schemes the situation is quite different.  ... 
arXiv:1705.02417v1 fatcat:2auz5at5o5f4lfwzcgi4xvw2g4
« Previous Showing results 1 — 15 out of 30 results