Séta: Supersingular Encryption from Torsion Attacks
نویسندگان
چکیده
We present Séta (To be pronounced [?e:t?] meaning “walk” in Hungarian.), a new family of public-key encryption schemes with post-quantum security based on isogenies supersingular elliptic curves. It is constructed from trapdoor one-way functions, where the inversion algorithm uses Petit’s so called torsion attacks SIDH to compute an isogeny between curves given endomorphism starting curve and images points. prove OW-CPA IND-CCA variant using OAEP transformation. Several variants for key generation are explored together their impact selection parameters, such as base prime scheme. furthermore formalise “uber” assumption framework which aims generalize computational problems encountered including SIDH, CSDIH, OSIDH ours. Finally, we carefully select parameters achieve balance run-times experimental results our implementation.
منابع مشابه
Discrete Torsion for the Supersingular Orbifold Sigma Genus
The first purpose of this paper is to examine the relationship between equivariant elliptic genera and orbifold elliptic genera. We apply the character theory of [HKR00] to the Borel-equivariant genus associated to the sigma orientation of [AHS01] to define an orbifold genus for certain total quotient orbifolds and supersingular elliptic curves. We show that our orbifold genus is given by the s...
متن کاملPublic Key Encryption and Encryption Emulation Attacks
The main purpose of this paper is to show that public key encryption can be secure against the “encryption emulation” attack (on the sender’s encryption) by computationally unbounded adversary, with one reservation: a legitimate receiver decrypts correctly with probability that can be made arbitrarily close to 1, but not equal to 1. 1. Summary of our claims We thought it would make sense to sum...
متن کاملSide-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-Hellman
In this paper, we present three side-channel attacks on the quantum-resistant supersingular isogeny Di e-Hellman (SIDH) key exchange protocol. These re ned power analysis attacks target the representation of a zero value in a physical implementation of SIDH to extract bits of the secret key. To understand the behavior of these zero-attacks on SIDH, we investigate the representation of zero in t...
متن کاملAttacks on Message Stream Encryption
Message Stream Encryption (MSE) provides obfuscation, data confidentiality, and limited authentication to BitTorrent clients. Although obfuscation of header and payload data was the main design goal of MSE, users understandably still expect data confidentiality and authentication from their BitTorrent clients. In this paper, we present numerous attacks on the MSE protocol itself, independent of...
متن کاملRelated Randomness Attacks for Public Key Encryption
Several recent and high-profile incidents give cause to believe that randomness failures of various kinds are endemic in deployed cryptographic systems. In the face of this, it behoves cryptographic researchers to develop methods to immunise – to the extent that it is possible – cryptographic schemes against such failures. This paper considers the practically-motivated situation where an advers...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-92068-5_9