Secure Delegation of Isogeny Computations and Cryptographic Applications

被引:4
|
作者
Pedersen, Robi [1 ]
Uzunkol, Osmanbey [2 ]
机构
[1] Fernuniv, Fac Math & Comp Sci, Hagen, Germany
[2] Flensburg Univ Appl Sci, Fac Informat & Commun, Flensburg, Germany
来源
CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP | 2019年
关键词
Secure computation outsourcing; Post-quantum cryptographic protocols; Lightweight cryptography; Supersingular isogeny cryptography; ALGORITHMS;
D O I
10.1145/3338466.3358913
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We address the problem of speeding up isogeny computation for super-singular elliptic curves over finite fields using untrusted computational resources like third party servers or cloud service providers (CSPs). We first propose new, efficient and secure delegation schemes. This especially enables resource-constrained devices (e.g. smart cards, RFID tags, tiny sensor nodes) to effectively deploy post-quantum isogeny-based cryptographic protocols. To the best of our knowledge, these new schemes are the first attempt to generalize the classical secure delegation schemes for group exponentiations and pairing computation to an isogeny-based post-quantum setting. Then, we apply these secure delegation subroutines to improve the performance of supersingular isogeny-based zeroknowledge proofs of identity. Our experimental results show that, at the 128-bit quantum-security level, the proving party only needs about 3% of the original protocol cost, while the verifying party's effort is fully reduced to comparison operations. Lastly, we also apply our delegation schemes to decrease the computational cost of the decryption step for the NIST postquantum standardization candidate SIKE.
引用
收藏
页码:29 / 42
页数:14
相关论文
共 50 条
  • [1] On Secure Outsourcing of Cryptographic Computations to Cloud
    Kuppusamy, Lakshmi
    Rangasamy, Jothi
    Gauravaram, Praveen
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 63 - 67
  • [2] Efficient and verifiable algorithms for secure outsourcing of cryptographic computations
    Mehmet Sabır Kiraz
    Osmanbey Uzunkol
    International Journal of Information Security, 2016, 15 : 519 - 537
  • [3] Efficient and verifiable algorithms for secure outsourcing of cryptographic computations
    Kiraz, Mehmet Sabir
    Uzunkol, Osmanbey
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (05) : 519 - 537
  • [4] How secure are FPGAs in cryptographic applications?
    Wollinger, T
    Paar, C
    FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2003, 2778 : 91 - 100
  • [5] Secure Synthesis of Distributed Cryptographic Applications
    Acay, Cosku
    Gancher, Joshua
    Recto, Rolph
    Myers, Andrew C.
    2024 IEEE 37TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF 2024, 2024, : 433 - 448
  • [6] A survey on isogeny-based cryptographic protocols
    Mishra, Sweta
    Mondal, Bhaskar
    Jha, Rishi Kumar
    WIRELESS NETWORKS, 2025, 31 (03) : 2993 - 3024
  • [7] Isogeny-Based Cryptographic Access Control
    Aleksandrova, E. B.
    Shtyrkina, A. A.
    Yarmak, A., V
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (08) : 803 - 812
  • [8] Isogeny-Based Cryptographic Access Control
    E. B. Aleksandrova
    A. A. Shtyrkina
    A. V. Yarmak
    Automatic Control and Computer Sciences, 2020, 54 : 803 - 812
  • [9] Improvement and applications of secure outsourcing of scientific computations
    Yu, Jianhua
    Wang, Xueli
    Gao, Wei
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2015, 6 (06) : 763 - 772
  • [10] Improvement and applications of secure outsourcing of scientific computations
    Jianhua Yu
    Xueli Wang
    Wei Gao
    Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 763 - 772