Supersingular Isogeny-based Ring Signature
نویسندگان
چکیده
The increasing demand for secure and anonymous transactions raises the popularity of ring signatures, which is a digital signature scheme that allows identifying group possible signers without revealing identity actual signer. This paper presents efficient supersingular isogeny-based linkable schemes will find potential applications in post-quantum technologies. We develop by applying Fiat-Shamir transform on sigma protocol we obtain from interactive zero-knowledge identification adopting ring. also extend our with an additional parameter, i.e., tag provides to detect if signer issues two signatures concerning same preserving anonymity anonymity. size protocols increases logarithmically thanks Merkle trees. show security proofs efficiency analyses offered. Moreover, provide implementation results signature, offers small sizes NIST levels.
منابع مشابه
Signature Schemes Based On Supersingular Isogeny Problems
We present the first signature schemes whose security relies on computational assumptions relating to isogeny graphs of supersingular elliptic curves. We give two schemes, both of them based on interactive identification protocols. The first identification protocol is due to De Feo, Jao and Plût. The second one, and the main contribution of the paper, uses novel ideas that have not been used in...
متن کاملIdentification Protocols and Signature Schemes Based on Supersingular Isogeny Problems
We present signature schemes whose security relies on computational assumptions relating to isogeny graphs of supersingular elliptic curves. We give two schemes, both of them based on interactive identification protocols. The first identification protocol is due to De Feo, Jao and Plût. The second one, and the main contribution of the paper, makes novel use of an algorithm of Kohel, Lauter, Pet...
متن کاملOn the Security of Supersingular Isogeny Cryptosystems
We study cryptosystems based on supersingular isogenies. This is an active area of research in post-quantum cryptography. Our first contribution is to give a very powerful active attack on the supersingular isogeny encryption scheme. This attack can only be prevented by using a (relatively expensive) countermeasure. Our second contribution is to show that the security of all schemes of this typ...
متن کاملFault Attack on Supersingular Isogeny Cryptosystems
We present the first fault attack on cryptosystems based on supersingular isogenies. During the computation of the auxiliary points, the attack aims to change the base point to a random point on the curve via a fault injection. We will show that this would reveal the secret isogeny with one successful perturbation with high probability. We will exhibit the attack by placing it against signature...
متن کاملLoop-Abort Faults on Supersingular Isogeny Cryptosystems
Cryptographic schemes based on supersingular isogenies have become an active area of research in the field of post-quantum cryptography. We investigate the resistance of these cryptosystems to fault injection attacks. It appears that the iterative structure of the secret isogeny computation renders these schemes vulnerable to loop-abort attacks. Loop-abort faults allow to perform a full key rec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information Security Science
سال: 2023
ISSN: ['2147-0030']
DOI: https://doi.org/10.55859/ijiss.1187756