dc.contributor.author | de Kock, Bor | |
dc.contributor.author | Gjøsteen, Kristian | |
dc.contributor.author | Veroni, Mattia | |
dc.date.accessioned | 2022-09-14T12:42:55Z | |
dc.date.available | 2022-09-14T12:42:55Z | |
dc.date.created | 2021-08-16T13:35:02Z | |
dc.date.issued | 2021 | |
dc.identifier.citation | Lecture Notes in Computer Science (LNCS). 2021, 12804 451-479. | en_US |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | https://hdl.handle.net/11250/3017855 | |
dc.description.abstract | We exploit the Diffie-Hellman-like structure of CSIDH to build a quantum-resistant authenticated key-exchange algorithm. Our security proof has optimal tightness, which means that the protocol is efficient even when instantiated with theoretically-sound security parameters. Compared to previous isogeny-based authenticated key-exchange protocols, our scheme is extremely simple, its security relies only on the underlying CSIDH-problem and it has optimal communication complexity for CSIDH-based protocols. Our security proof relies heavily on the re-randomizability of CSIDH-like problems and carries on in the ROM. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Springer, Cham | en_US |
dc.title | Practical Isogeny-Based Key-Exchange with Optimal Tightness | en_US |
dc.type | Journal article | en_US |
dc.type | Peer reviewed | en_US |
dc.description.version | acceptedVersion | en_US |
dc.rights.holder | © 2021 Springer Nature Switzerland AG | en_US |
dc.source.pagenumber | 451-479 | en_US |
dc.source.volume | 12804 | en_US |
dc.source.journal | Lecture Notes in Computer Science (LNCS) | en_US |
dc.identifier.doi | 10.1007/978-3-030-81652-0 | |
dc.identifier.cristin | 1926318 | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |