2019
DOI: 10.1007/978-3-030-31919-9_20
|View full text |Cite
|
Sign up to set email alerts
|

One-Round Authenticated Group Key Exchange from Isogenies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 9 publications
0
9
0
1
Order By: Relevance
“…However, these constructions assume that a setup algorithm establishing a double-tree graph configuration is freshly run after each execution so that each participant is aware of his position in the underlying tree structure (which he should know to prepare and receive messages from ancestors and descendants). Closer to the scenario we consider here, Fujioka et al [3] presented two one-round authenticated protocols, n-UM and BC n-DH. The first of these is proven secure in the so-called Quantum Random Oracle Model (QROM) (where adversaries may query the involved hash functions with a superposition of states), while the second only considers adversaries that classically interact with the involved Random Oracles.…”
Section: Related Work Post-quantum Group Key Exchangementioning
confidence: 99%
See 2 more Smart Citations
“…However, these constructions assume that a setup algorithm establishing a double-tree graph configuration is freshly run after each execution so that each participant is aware of his position in the underlying tree structure (which he should know to prepare and receive messages from ancestors and descendants). Closer to the scenario we consider here, Fujioka et al [3] presented two one-round authenticated protocols, n-UM and BC n-DH. The first of these is proven secure in the so-called Quantum Random Oracle Model (QROM) (where adversaries may query the involved hash functions with a superposition of states), while the second only considers adversaries that classically interact with the involved Random Oracles.…”
Section: Related Work Post-quantum Group Key Exchangementioning
confidence: 99%
“…Closer to the scenario we consider here, Fujioka et al. [3] presented two one‐round authenticated protocols, n‐UM and BC n‐DH. The first of these is proven secure in the so‐called Quantum Random Oracle Model (QROM) (where adversaries may query the involved hash functions with a superposition of states), while the second only considers adversaries that classically interact with the involved Random Oracles.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…There have been several recent proposals of group key exchange protocols that provide some kind of resistance against quantum attacks (see Table 1 for a comparison between the main GAKE protocols). The protocol presented in [1] by Fujioka et al is based on the problem of finding isogeny mappings between two supersingular elliptic curves with the same number of points. In the same line, Hougaard and Miyaji presented in [2] several designs based on isogenies.…”
Section: A Related Workmentioning
confidence: 99%
“…Related work. Since De Feo and Jao's work [27,17], others have explored different directions of supersingular isogenies [15,3,23,24,19,20,12,35,2,21,30]. However, to the best of our knowledge, our work is the first to present a framework for "exponentiation-based" protocols which unifies supersingular isogenies with previous constructions and also provides a separation between protocol design and analysis of computational assumptions.…”
Section: Introductionmentioning
confidence: 99%