Authenticated logarithmic-order supersingular isogeny group key exchange

نویسندگان

چکیده

We present the first constant-round, tree-based, group key exchange protocol based on SIDH with logarithmic-order communication and memory complexity, where only previous isogeny-based exchange, SIBD, has linear-order complexity. call our supersingular isogeny tree-based (SIT). show that satisfies post-quantum security through a reduction to decisional Diffie–Hellman (SSDDH) problem in model of Manulis, Suzuki, Ustaoglu. also construct peer-to-peer (sequential) version SIT. Finally, we compiler turns SIT into an authenticated while maintaining same complexity as SIT, resulting (A-SIT).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Partitioned Group Password-Based Authenticated Key Exchange

Group Password-Based Authenticated Key Exchange (GPAKE) allows a group of users to establish a secret key, as long as all of them share the same password. However, in existing GPAKE protocols as soon as one user runs the protocol with a non-matching password, all the others abort and no key is established. In this paper we seek for a more flexible, yet secure, GPAKE and put forward the notion o...

متن کامل

Provably Authenticated Group Diie-hellman Key Exchange

Group Diie-Hellman protocols for Authenticated Key Exchange (AKE) are designed to provide a pool of players with a shared secret key which may later be used, for example, to achieve multicast message integrity. Over the years, several schemes have been ooered. However, no formal treatment for this cryptographic problem has ever been suggested. In this paper, we present a security model for this...

متن کامل

Efficient Compilers for Authenticated Group Key Exchange

In this paper we propose two compilers which are designed to transform a group key exchange protocol secure against any passive adversary into an authenticated group key exchange protocol with key confirmation which is secure against any passive adversary, active adversary, or malicious insider. We show that the first proposed compiler gives protocols that are more efficient than those produced...

متن کامل

ID-Based Group Password-Authenticated Key Exchange

Password-authenticated key exchange (PAKE) protocols are designed to be se-cure even when the secret key used for authentication is a human-memorable password. In thispaper, we consider PAKE protocols in the group scenario, in which a group of clients, each ofthem shares a password with an “honest but curious” server, intend to establish a common secretkey (i.e., a group key) wi...

متن کامل

A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol

Since its introduction by Jao and De Feo in 2011, the supersingular isogeny Diffie-Hellman (SIDH) key exchange protocol has positioned itself as a promising candidate for post-quantum cryptography. One salient feature of the SIDH protocol is that it requires exceptionally short key sizes. However, the latency associated to SIDH is higher than the ones reported for other post-quantum cryptosyste...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Information Security

سال: 2021

ISSN: ['1615-5262', '1615-5270']

DOI: https://doi.org/10.1007/s10207-021-00549-4