×
Mar 13, 2020 · In this paper, we propose a multi-party (group) key exchange protocol based on CSIDH (Commutative Supersingular Isogeny Diffie–Hellman)
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems. Tomoki Moriya · Computer Science.
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems. https://doi.org/10.1007/978-3-030-42921-8_5 ·.
In this paper, we propose a multi-party (group) key exchange protocol based on CSIDH (Commutative Supersingular Isogeny Diffie–Hellman), ...
People also ask
Co-authors ; Group key exchange from CSIDH and its application to trusted setup in supersingular isogeny cryptosystems. T Moriya, K Takashima, T Takagi.
The Diffie–Hellman scheme resulting from the group action allows for public-key validation at very little cost, runs reasonably fast in practice, ...
We propose an efficient commutative group action suitable for non-interactive key exchange in a post-quantum setting. Our con- struction follows the layout of ...
Missing: Trusted | Show results with:Trusted
Jul 30, 2022 · A paper just appeared which shows you can break the basic security level of SIKE in under an hour. Even the highest security level keys can be recovered in ...
Missing: Exchange | Show results with:Exchange
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems. Chapter. Mar 2020. Tomoki Moriya · Katsuyuki ...