Authenticated logarithmic-order supersingular isogeny group key exchange
نویسندگان
چکیده
We present the first constant-round, tree-based, group key exchange protocol based on SIDH with logarithmic-order communication and memory complexity, where only previous isogeny-based exchange, SIBD, has linear-order complexity. call our supersingular isogeny tree-based (SIT). show that satisfies post-quantum security through a reduction to decisional Diffie–Hellman (SSDDH) problem in model of Manulis, Suzuki, Ustaoglu. also construct peer-to-peer (sequential) version SIT. Finally, we compiler turns SIT into an authenticated while maintaining same complexity as SIT, resulting (A-SIT).
منابع مشابه
Partitioned Group Password-Based Authenticated Key Exchange
Group Password-Based Authenticated Key Exchange (GPAKE) allows a group of users to establish a secret key, as long as all of them share the same password. However, in existing GPAKE protocols as soon as one user runs the protocol with a non-matching password, all the others abort and no key is established. In this paper we seek for a more flexible, yet secure, GPAKE and put forward the notion o...
متن کاملProvably Authenticated Group Diie-hellman Key Exchange
Group Diie-Hellman protocols for Authenticated Key Exchange (AKE) are designed to provide a pool of players with a shared secret key which may later be used, for example, to achieve multicast message integrity. Over the years, several schemes have been ooered. However, no formal treatment for this cryptographic problem has ever been suggested. In this paper, we present a security model for this...
متن کاملEfficient Compilers for Authenticated Group Key Exchange
In this paper we propose two compilers which are designed to transform a group key exchange protocol secure against any passive adversary into an authenticated group key exchange protocol with key confirmation which is secure against any passive adversary, active adversary, or malicious insider. We show that the first proposed compiler gives protocols that are more efficient than those produced...
متن کاملID-Based Group Password-Authenticated Key Exchange
Password-authenticated key exchange (PAKE) protocols are designed to be se-cure even when the secret key used for authentication is a human-memorable password. In thispaper, we consider PAKE protocols in the group scenario, in which a group of clients, each ofthem shares a password with an “honest but curious” server, intend to establish a common secretkey (i.e., a group key) wi...
متن کاملA Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
Since its introduction by Jao and De Feo in 2011, the supersingular isogeny Diffie-Hellman (SIDH) key exchange protocol has positioned itself as a promising candidate for post-quantum cryptography. One salient feature of the SIDH protocol is that it requires exceptionally short key sizes. However, the latency associated to SIDH is higher than the ones reported for other post-quantum cryptosyste...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information Security
سال: 2021
ISSN: ['1615-5262', '1615-5270']
DOI: https://doi.org/10.1007/s10207-021-00549-4