The system will be going down for regular maintenance. Please save your work and logout.
Towards practical key exchange from ordinary isogeny graphs
DE FEO, Luca
Laboratoire d'informatique de l'École polytechnique [Palaiseau] [LIX]
Laboratoire de Mathématiques de Versailles [LMV]
Laboratoire d'informatique de l'École polytechnique [Palaiseau] [LIX]
Laboratoire de Mathématiques de Versailles [LMV]
KIEFFER, Jean
Lithe and fast algorithmic number theory [LFANT]
Institut de Mathématiques de Bordeaux [IMB]
École normale supérieure - Paris [ENS-PSL]
Lithe and fast algorithmic number theory [LFANT]
Institut de Mathématiques de Bordeaux [IMB]
École normale supérieure - Paris [ENS-PSL]
SMITH, Benjamin
Geometry, arithmetic, algorithms, codes and encryption [GRACE]
Institut de Mathématiques de Bordeaux [IMB]
Geometry, arithmetic, algorithms, codes and encryption [GRACE]
Institut de Mathématiques de Bordeaux [IMB]
DE FEO, Luca
Laboratoire d'informatique de l'École polytechnique [Palaiseau] [LIX]
Laboratoire de Mathématiques de Versailles [LMV]
Laboratoire d'informatique de l'École polytechnique [Palaiseau] [LIX]
Laboratoire de Mathématiques de Versailles [LMV]
KIEFFER, Jean
Lithe and fast algorithmic number theory [LFANT]
Institut de Mathématiques de Bordeaux [IMB]
École normale supérieure - Paris [ENS-PSL]
Lithe and fast algorithmic number theory [LFANT]
Institut de Mathématiques de Bordeaux [IMB]
École normale supérieure - Paris [ENS-PSL]
SMITH, Benjamin
Geometry, arithmetic, algorithms, codes and encryption [GRACE]
Institut de Mathématiques de Bordeaux [IMB]
< Reduce
Geometry, arithmetic, algorithms, codes and encryption [GRACE]
Institut de Mathématiques de Bordeaux [IMB]
Language
en
Communication dans un congrès
This item was published in
Lecture Notes in Computer Science, Lecture Notes in Computer Science, ASIACRYPT 2018 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, 2018-12-02, Brisbane. vol. vol 11274
Springer, Cham
English Abstract
We revisit the ordinary isogeny-graph based cryptosystems of Couveignes and Rostovtsev-Stolbunov, long dismissed as impractical. We give algorithmic improvements that accelerate key exchange in this framework, and explore ...Read more >
We revisit the ordinary isogeny-graph based cryptosystems of Couveignes and Rostovtsev-Stolbunov, long dismissed as impractical. We give algorithmic improvements that accelerate key exchange in this framework, and explore the problem of generating suitable system parameters for contemporary pre-and post-quantum security that take advantage of these new algorithms. We also prove the session-key security of this key exchange in the Canetti-Krawczyk model, and the IND-CPA security of the related public-key encryption scheme, under reasonable assumptions on the hardness of computing isogeny walks. Our systems admit efficient key-validation techniques that yield CCA-secure encryp-tion, thus providing an important step towards efficient post-quantum non-interactive key exchange (NIKE).Read less <
English Keywords
key exchange
elliptic curves
isogenies
post-quantum cryptography
Origin
Hal imported