Group Key Exchange from CSIDH and Its Application to Trusted Setup in ...
link.springer.com › chapter
Mar 13, 2020 · In this paper, we propose a multi-party (group) key exchange protocol based on CSIDH (Commutative Supersingular Isogeny Diffie–Hellman)
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems. Tomoki Moriya · Computer Science.
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems. https://doi.org/10.1007/978-3-030-42921-8_5 ·.
In this paper, we propose a multi-party (group) key exchange protocol based on CSIDH (Commutative Supersingular Isogeny Diffie–Hellman), ...
People also ask
What is the Csidh protocol?
Which algorithm facilitates key exchange to generate a shared secret key?
Co-authors ; Group key exchange from CSIDH and its application to trusted setup in supersingular isogeny cryptosystems. T Moriya, K Takashima, T Takagi.
Jul 31, 2022 · We present an efficient key recovery attack on the Supersingular Isogeny Diffie-Hellman protocol (SIDH), based on a glue-and-split theorem due to Kani.
Missing: Setup | Show results with:Setup
The Diffie–Hellman scheme resulting from the group action allows for public-key validation at very little cost, runs reasonably fast in practice, ...
We propose an efficient commutative group action suitable for non-interactive key exchange in a post-quantum setting. Our con- struction follows the layout of ...
Missing: Trusted | Show results with:Trusted
Jul 30, 2022 · A paper just appeared which shows you can break the basic security level of SIKE in under an hour. Even the highest security level keys can be recovered in ...
Missing: Exchange | Show results with:Exchange
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems. Chapter. Mar 2020. Tomoki Moriya · Katsuyuki ...