Séta: Supersingular Encryption from Torsion Attacks

نویسندگان

چکیده

We present Séta (To be pronounced [?e:t?] meaning “walk” in Hungarian.), a new family of public-key encryption schemes with post-quantum security based on isogenies supersingular elliptic curves. It is constructed from trapdoor one-way functions, where the inversion algorithm uses Petit’s so called torsion attacks SIDH to compute an isogeny between curves given endomorphism starting curve and images points. prove OW-CPA IND-CCA variant using OAEP transformation. Several variants for key generation are explored together their impact selection parameters, such as base prime scheme. furthermore formalise “uber” assumption framework which aims generalize computational problems encountered including SIDH, CSDIH, OSIDH ours. Finally, we carefully select parameters achieve balance run-times experimental results our implementation.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Discrete Torsion for the Supersingular Orbifold Sigma Genus

The first purpose of this paper is to examine the relationship between equivariant elliptic genera and orbifold elliptic genera. We apply the character theory of [HKR00] to the Borel-equivariant genus associated to the sigma orientation of [AHS01] to define an orbifold genus for certain total quotient orbifolds and supersingular elliptic curves. We show that our orbifold genus is given by the s...

متن کامل

Public Key Encryption and Encryption Emulation Attacks

The main purpose of this paper is to show that public key encryption can be secure against the “encryption emulation” attack (on the sender’s encryption) by computationally unbounded adversary, with one reservation: a legitimate receiver decrypts correctly with probability that can be made arbitrarily close to 1, but not equal to 1. 1. Summary of our claims We thought it would make sense to sum...

متن کامل

Side-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-Hellman

In this paper, we present three side-channel attacks on the quantum-resistant supersingular isogeny Di e-Hellman (SIDH) key exchange protocol. These re ned power analysis attacks target the representation of a zero value in a physical implementation of SIDH to extract bits of the secret key. To understand the behavior of these zero-attacks on SIDH, we investigate the representation of zero in t...

متن کامل

Attacks on Message Stream Encryption

Message Stream Encryption (MSE) provides obfuscation, data confidentiality, and limited authentication to BitTorrent clients. Although obfuscation of header and payload data was the main design goal of MSE, users understandably still expect data confidentiality and authentication from their BitTorrent clients. In this paper, we present numerous attacks on the MSE protocol itself, independent of...

متن کامل

Related Randomness Attacks for Public Key Encryption

Several recent and high-profile incidents give cause to believe that randomness failures of various kinds are endemic in deployed cryptographic systems. In the face of this, it behoves cryptographic researchers to develop methods to immunise – to the extent that it is possible – cryptographic schemes against such failures. This paper considers the practically-motivated situation where an advers...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-92068-5_9