2021
DOI: 10.1007/978-3-030-68890-5_4
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Authenticated Key Exchange from Random Self-reducibility on CSIDH

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…However, very recently, a polynomial-time key recovery attack on SIDH [32] was found by Castryck and Decru, which implies that SIDH-based AKE is insecure now. On the other hand, CSIDH-based AKE schemes [33]- [35] are also proposed. Since the attack to SIDH is not applicable to CSIDH, CSIDH-based AKE schemes are still secure.…”
Section: Isogeny-based Akementioning
confidence: 99%
“…However, very recently, a polynomial-time key recovery attack on SIDH [32] was found by Castryck and Decru, which implies that SIDH-based AKE is insecure now. On the other hand, CSIDH-based AKE schemes [33]- [35] are also proposed. Since the attack to SIDH is not applicable to CSIDH, CSIDH-based AKE schemes are still secure.…”
Section: Isogeny-based Akementioning
confidence: 99%
“…One post-quantum option that avoids the problem with KEMs described above is to use CSIDH [20], a primitive based on supersingular isogenies that yields a commutative group action which enables non-interactive key exchange. CSIDH could be used to achieve implicit Alice-to-Bob authentication while maintaining asynchronicity and deniability; indeed several key exchange protocols from CSIDH have been proposed [27,54]. Unfortunately, there are several reasons CSIDH may not be a fully satisfactory solution: it is much more computationally expensive than most other forms of post-quantum cryptography; there is ongoing debate about the security of its concrete parameters [11,73]; and the decisional form of a related problem [21] is not hard.…”
Section: Options For Pq Asynchronous Dakementioning
confidence: 99%
“…While we know instantiations for most of the above assumptions with respect to a classical attacker, at this moment we do not know of a post-quantum secure instantiation of the DDH assumption. In the future, a candidate for post-quantum DDH could be the CSI-DDH [45] assumption, based on the CSIDH assumption [24]. Their concrete security is however the subject of discussions [13,16,20,54].…”
Section: Cryptographic Assumptions In Pq-bcmentioning
confidence: 99%