Affiliation:
1. School of Cybersecurity, Northwestern Polytechnical University , Xi’an 710072 , People’s Republic of China
Abstract
Abstract
The SIDH and CSIDH are now the two most well-known post-quantum key exchange protocols from the supersingular isogeny-based cryptography, which have attracted much attention in recent years and served as the building blocks of other supersingular isogeny-based cryptographic schemes. The famous SIKE is a post-quantum key encapsulation mechanism (KEM) constructed on the SIDH, motivated by which, this article presents a new post-quantum KEM-based on the CSIDH, which is thereby named as CSIKE. The presented CSIKE has much higher computation efficiency in the decapsulation part by involving an additional tag in the encapsulation results. The new CSIKE is formally proved to be IND-CCA secure under the standard isogeny-based quantum resistant security assumption. Moreover, by comparing the new CSIKE with the only two existing CSIDH-based KEM schemes, i.e., CSIDH-PSEC-KEM and CSIDH-ECIES-KEM, it can be easily found that the new CSIKE has a slightly longer encapsulation size than CSIDH-PSEC-KEM and CSIDH-ECIES-KEM, but (i) it beats the CSIDH-PSEC-KEM by the improvement of approximately 50% in decapsulation speed, and (ii) it has a certain advantage over the CSIDH-ECIES-KEM in security since in the random oracle model, the security proof for CSIDH-ECIES-KEM needs to rely on the stronger CSI-GDH assumption, while the new CSIKE just needs to rely on the basic CSI-CDH assumption.
Subject
Applied Mathematics,Computational Mathematics,Computer Science Applications
Reference46 articles.
1. Cramer R, Shoup V. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J Comput. 2003;33(1):167–226.
2. Kurosawa K, Desmedt Y. A new paradigm of hybrid encryption scheme. In: Franklin M, editor. Advances in Cryptology - CRYPTO 2004. Berlin, Heidelberg: Springer; 2004. p. 426–42.
3. Kiltz E. Chosen-Ciphertext secure key-encapsulation based on gap hashed Diffie–Hellman. In: Okamoto T, Wang X, editors. Public Key Cryptography - PKC 2007. Berlin, Heidelberg: Springer; 2007. p. 282–97.
4. Shoup V. ISO/IEC 18033-2: 2006: Information technology-security techniques-encryption algorithms-part 2: Asymmetric ciphers. International Organization for Standardization, Geneva, Switzerland. 2006. p. 44.
5. Dierks T, Rescorla E. The transport layer security (TLS) protocol version 1.2. 2008.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secure Messaging Application Development: Based on Post-Quantum Algorithms CSIDH, Falcon, and AES Symmetric Key Cryptosystem;Programming and Computer Software;2024-07-30
2. OPRFs from Isogenies;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
3. Secure Messaging Using Post-Quantum Key Sharing Based on CSIDH and Fujisaki-Okamoto Transform;International Journal of Scientific Research in Computer Science, Engineering and Information Technology;2024-03-25