2020
DOI: 10.1007/978-3-030-64357-7_4
|View full text |Cite
|
Sign up to set email alerts
|

Taming the Many EdDSAs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…c = #E(F p )/ ) to ensure that A does not have low order. However, due to the lack of key validation, the Ed25519 signature scheme can not guarantee non-repudiation or resilience to key-substitution attacks (see [11,Sect. A] for an example).…”
Section: Compatibility With Other Ecc Librariesmentioning
confidence: 99%
See 2 more Smart Citations
“…c = #E(F p )/ ) to ensure that A does not have low order. However, due to the lack of key validation, the Ed25519 signature scheme can not guarantee non-repudiation or resilience to key-substitution attacks (see [11,Sect. A] for an example).…”
Section: Compatibility With Other Ecc Librariesmentioning
confidence: 99%
“…As analyzed in e.g. [11,16], existing implementations of variants or tweaks of Ed25519 differ with respect to the following aspects.…”
Section: Compatibility With Other Ecc Librariesmentioning
confidence: 99%
See 1 more Smart Citation
“…Input points might however lie outside of that subgroup, leading to potential trouble in some protocols, because that allows the existence of distinct curve points which are still "equivalent" in the sense that they differ only by a small order point [CJ19]. Even in the simple case of signatures, the non-trivial cofactor f can lead to different implementations disagreeing on whether a given signature (maliciously crafted by the signer) is valid or not, which can break consensus protocols [CGN20].…”
Section: Introductionmentioning
confidence: 99%
“…Using a Type 3 curve in this analysis gives a fairer comparison to pairings-free schemes. Both ED25519 and BN462 provide 128-bit security[42][43]. As can be seen from Fig.3, on the tested hardware the schemes using pairings (shown with a dashed outline) were much slower for both signature generation and verification than pairing-free schemes.…”
mentioning
confidence: 98%