Show simple item record

hal.structure.identifierLithe and fast algorithmic number theory [LFANT]
dc.contributor.authorDE FEO, Luca
hal.structure.identifierCatholic University of Leuven = Katholieke Universiteit Leuven [KU Leuven]
dc.contributor.authorDELPECH DE SAINT GUILHEM, Cyprien
hal.structure.identifierUniversità degli Studi Roma Tre = Roma Tre University [ROMA TRE]
dc.contributor.authorFOUOTSA, Tako Boris
hal.structure.identifierEötvös Loránd University [ELTE]
hal.structure.identifierUniversity of Birmingham [Birmingham]
dc.contributor.authorKUTAS, Péter
hal.structure.identifierDirection générale de l'armement [Bagneux] [DGA]
hal.structure.identifierLaboratoire d'informatique de l'École polytechnique [Palaiseau] [LIX]
hal.structure.identifierGeometry, arithmetic, algorithms, codes and encryption [GRACE]
dc.contributor.authorLEROUX, Antonin
hal.structure.identifierUniversity of Birmingham [Birmingham]
hal.structure.identifierUniversité libre de Bruxelles [ULB]
dc.contributor.authorPETIT, Christophe
hal.structure.identifierUniversitat Pompeu Fabra [Barcelona] [UPF]
dc.contributor.authorSILVA, Javier
hal.structure.identifierLithe and fast algorithmic number theory [LFANT]
hal.structure.identifierCentre National de la Recherche Scientifique [CNRS]
dc.contributor.authorWESOLOWSKI, Benjamin
dc.contributor.editorMehdi Tibouchi
dc.contributor.editorHuaxiong Wang
dc.date.accessioned2024-04-04T02:43:31Z
dc.date.available2024-04-04T02:43:31Z
dc.date.issued2021-12-01
dc.date.conference2021-12-06
dc.identifier.urihttps://oskar-bordeaux.fr/handle/20.500.12278/191342
dc.description.abstractEnWe present Séta, 11 a new family of public-key encryption schemes with post-quantum security based on isogenies of supersingular elliptic curves. It is constructed from a new family of trapdoor one-way functions, where the inversion algorithm uses Petit's so called torsion attacks on SIDH to compute an isogeny between supersingular elliptic curves given an endomorphism of the starting curve and images of torsion points. We prove the OW-CPA security of Séta and present an IND-CCA variant using the post-quantum OAEP transformation. Several variants for key generation are explored together with their impact on the selection of parameters, such as the base prime of the scheme. We furthermore formalise an "uber" isogeny assumption framework which aims to generalize computational isogeny problems encountered in schemes including SIDH, CSDIH, OSIDH and ours. Finally, we carefully select parameters to achieve a balance between security and run-times and present experimental results from our implementation.
dc.language.isoen
dc.publisherSpringer International Publishing
dc.publisher.locationCham
dc.title.enSéta: Supersingular Encryption from Torsion Attacks
dc.typeCommunication dans un congrès
dc.identifier.doi10.1007/978-3-030-92068-5_9
dc.subject.halInformatique [cs]/Cryptographie et sécurité [cs.CR]
bordeaux.page249-278
bordeaux.volume13093
bordeaux.hal.laboratoriesInstitut de Mathématiques de Bordeaux (IMB) - UMR 5251*
bordeaux.institutionUniversité de Bordeaux
bordeaux.institutionBordeaux INP
bordeaux.institutionCNRS
bordeaux.conference.titleASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security
bordeaux.countrySG
bordeaux.conference.citySingapour
bordeaux.peerReviewedoui
hal.identifierhal-03471926
hal.version1
hal.invitednon
hal.proceedingsoui
hal.conference.end2021-12-10
hal.popularnon
hal.audienceInternationale
hal.origin.linkhttps://hal.archives-ouvertes.fr//hal-03471926v1
bordeaux.COinSctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.date=2021-12-01&rft.volume=13093&rft.spage=249-278&rft.epage=249-278&rft.au=DE%20FEO,%20Luca&DELPECH%20DE%20SAINT%20GUILHEM,%20Cyprien&FOUOTSA,%20Tako%20Boris&KUTAS,%20P%C3%A9ter&LEROUX,%20Antonin&rft.genre=unknown


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record