Affiliation:
1. Department of Mathematics, University of Toronto, ON, Canada
2. Department of Combinatorics and Optimization University of Waterloo, ON, Canada
Abstract
AbstractWe consider the problem of producing an efficient, practical, quantum-resistant non-interactive key exchange (NIKE) protocol based on Supersingular Isogeny Diffie-Hellman (SIDH). An attack of Galbraith, Petit, Shani and Ti rules out the use of naïve forms of the SIDH construction for this application, as they showed that an adversary can recover private key information when supplying an honest party with malformed public keys. Subsequently, Azarderakhsh, Jao and Leonardi presented a method for overcoming this attack using multiple instances of the SIDH protocol, but which increases the costs associated with performing a key exchange by factors of up to several thousand at typical security levels. In this paper, we present two new techniques to reduce the cost of SIDH-based NIKE, with various possible tradeoffs between key size and computational cost.
Subject
Applied Mathematics,Computational Mathematics,Computer Science Applications
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Isogeny-Based Group Key Establishment Scheme;Intelligent Sustainable Systems;2023
2. Website Spoofing as Technology of Cyber Attacks on the Computer Systems;Lecture Notes in Networks and Systems;2022-11-16
3. Torsion point attacks on ‘SIDH‐like’ cryptosystems;IET Information Security;2022-07-04
4. SIDH Proof of Knowledge;Advances in Cryptology – ASIACRYPT 2022;2022
5. A New Adaptive Attack on SIDH;Topics in Cryptology – CT-RSA 2022;2022