2021
DOI: 10.1007/s10207-021-00549-4
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated logarithmic-order supersingular isogeny group key exchange

Abstract: We present the first constant round, multicast, authenticated tree-based R-LWE group key exchange protocol with logarithmic communication and memory complexity. Our protocol achieves postquantum security through a reduction to a Diffie-Hellman-like analogue to the decisional R-LWE problem. We also present a sequential version with constant memory complexity but a logarithmic number of rounds and communication complexity.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…The protocol presented in [1] by Fujioka et al is based on the problem of finding isogeny mappings between two supersingular elliptic curves with the same number of points. In the same line, Hougaard and Miyaji presented in [2] several designs based on isogenies. The authenticated protocols are named A-SIT and A-P2P-SIT, with the latter being the peer-to-peer version of A-SIT, which means that it reduces the protocol complexity in terms of communication and memory.…”
Section: A Related Workmentioning
confidence: 94%
See 2 more Smart Citations
“…The protocol presented in [1] by Fujioka et al is based on the problem of finding isogeny mappings between two supersingular elliptic curves with the same number of points. In the same line, Hougaard and Miyaji presented in [2] several designs based on isogenies. The authenticated protocols are named A-SIT and A-P2P-SIT, with the latter being the peer-to-peer version of A-SIT, which means that it reduces the protocol complexity in terms of communication and memory.…”
Section: A Related Workmentioning
confidence: 94%
“…As far as we now, our protocol is the only existing GAKE that simultaneously satisfy the two following properties: can be implemented from any KEM, offers security in the post-quantum setting and does not make use of post-quantum signatures. To justify this fact, note that among the protocols enumerated in Table 1, [1], [2], [3], [4], [5], [6], [7], [11] use specific KEMs or post-quantum mathematical problems, [8] makes use of a post-quantum signature and [9], [10] depart from a two-party key exchange protocol, not from a KEM. As every NIST finalist must include a KEM, this allows us to provide full and working implementations of our GAKE with all the finalists.…”
Section: B Our Contributionmentioning
confidence: 99%
See 1 more Smart Citation
“…Building on the hardness of Diffie-Hellman-like problems related to isogenies, a first construction called SIBD is proposed in [11], which only considers passive adversaries. Building upon this, several tree-based constructions, including an authenticated design can be found in [12]. In particular, the proposal A-SIT and its peer-to-peer version, A-P2P-SIT, resist active attacks, as group members are authenticated through a post-quantum signature scheme.…”
Section: Related Work Post-quantum Group Key Exchangementioning
confidence: 99%
“…Hector and Atsuko [ 34 ] proposed the first consistent, tree-based, SIDH-based group exchange protocol with logarithmic-order connectivity and memory complex, of which the only key exchange group based on isogeny has linear order. Authors [ 35 ] identify that the protocol used in [ 36 ] is vulnerable to link ability of users, denial-of-service attacks, and replay attacks.…”
Section: Related Workmentioning
confidence: 99%