Supersingular Isogeny-based Ring Signature

نویسندگان

چکیده

The increasing demand for secure and anonymous transactions raises the popularity of ring signatures, which is a digital signature scheme that allows identifying group possible signers without revealing identity actual signer. This paper presents efficient supersingular isogeny-based linkable schemes will find potential applications in post-quantum technologies. We develop by applying Fiat-Shamir transform on sigma protocol we obtain from interactive zero-knowledge identification adopting ring. also extend our with an additional parameter, i.e., tag provides to detect if signer issues two signatures concerning same preserving anonymity anonymity. size protocols increases logarithmically thanks Merkle trees. show security proofs efficiency analyses offered. Moreover, provide implementation results signature, offers small sizes NIST levels.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Signature Schemes Based On Supersingular Isogeny Problems

We present the first signature schemes whose security relies on computational assumptions relating to isogeny graphs of supersingular elliptic curves. We give two schemes, both of them based on interactive identification protocols. The first identification protocol is due to De Feo, Jao and Plût. The second one, and the main contribution of the paper, uses novel ideas that have not been used in...

متن کامل

Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems

We present signature schemes whose security relies on computational assumptions relating to isogeny graphs of supersingular elliptic curves. We give two schemes, both of them based on interactive identification protocols. The first identification protocol is due to De Feo, Jao and Plût. The second one, and the main contribution of the paper, makes novel use of an algorithm of Kohel, Lauter, Pet...

متن کامل

On the Security of Supersingular Isogeny Cryptosystems

We study cryptosystems based on supersingular isogenies. This is an active area of research in post-quantum cryptography. Our first contribution is to give a very powerful active attack on the supersingular isogeny encryption scheme. This attack can only be prevented by using a (relatively expensive) countermeasure. Our second contribution is to show that the security of all schemes of this typ...

متن کامل

Fault Attack on Supersingular Isogeny Cryptosystems

We present the first fault attack on cryptosystems based on supersingular isogenies. During the computation of the auxiliary points, the attack aims to change the base point to a random point on the curve via a fault injection. We will show that this would reveal the secret isogeny with one successful perturbation with high probability. We will exhibit the attack by placing it against signature...

متن کامل

Loop-Abort Faults on Supersingular Isogeny Cryptosystems

Cryptographic schemes based on supersingular isogenies have become an active area of research in the field of post-quantum cryptography. We investigate the resistance of these cryptosystems to fault injection attacks. It appears that the iterative structure of the secret isogeny computation renders these schemes vulnerable to loop-abort attacks. Loop-abort faults allow to perform a full key rec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Information Security Science

سال: 2023

ISSN: ['2147-0030']

DOI: https://doi.org/10.55859/ijiss.1187756