Isogeny-Based Cryptographic Access Control

被引:3
|
作者
Aleksandrova, E. B. [1 ]
Shtyrkina, A. A. [1 ]
Yarmak, A., V [1 ]
机构
[1] Peter Great St Petersburg Polytech Univ, St Petersburg 195251, Russia
关键词
cryptography; postquantum cryptography; cryptographic access control; elliptic curves; isogenies of elliptic curves; SECURITY; SYSTEM;
D O I
10.3103/S0146411620080027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic access control is a relatively new concept that implements the access control rules of some subjects to an object using cryptographic primitives. A quantum computer of sufficient capacity allows solving in polynomial time the discrete logarithm and integer factorization problems, which are the basis of most modern public-key cryptosystems. In this regard, there is a need to search for new problems that are resistant to attacks on both classical computers and quantum computers. Computing the isogenies of supersingular elliptic curves is one of the most challenging problems. A scheme for cryptographic access control based on isogenies is proposed. Security analysis of the protocol and the results of practical implementation in the SAGE computer algebra system are given.
引用
收藏
页码:803 / 812
页数:10
相关论文
共 50 条
  • [1] Isogeny-Based Cryptographic Access Control
    E. B. Aleksandrova
    A. A. Shtyrkina
    A. V. Yarmak
    Automatic Control and Computer Sciences, 2020, 54 : 803 - 812
  • [2] A survey on isogeny-based cryptographic protocols
    Mishra, Sweta
    Mondal, Bhaskar
    Jha, Rishi Kumar
    WIRELESS NETWORKS, 2025, 31 (03) : 2993 - 3024
  • [3] Review of Chosen Isogeny-Based Cryptographic Schemes
    Drzazga, Bartosz
    Krzywiecki, Lukasz
    CRYPTOGRAPHY, 2022, 6 (02)
  • [4] Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack
    Tasso, Elise
    De Feo, Luca
    El Mrabet, Nadia
    Pontie, Simon
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2021, 2021, 12910 : 255 - 276
  • [5] Supersingular Isogeny-Based Single Compression Cryptographic Hash Function
    Zaman, Miraz Uz
    Min, Manki
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 4479 - 4484
  • [6] Arithmetic Considerations for Isogeny-Based Cryptography
    Bos, Joppe W.
    Friedberger, Simon J.
    IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (07) : 979 - 990
  • [7] Pairing Optimizations for Isogeny-Based Cryptosystems
    Cai, Shiping
    Lin, Kaizhan
    Zhao, Chang-An
    IET INFORMATION SECURITY, 2024, 2024
  • [8] Verifiable Isogeny Walks: Towards an Isogeny-Based Postquantum VDF
    Chavez-Saab, Jorge
    Rodriguez-Henriquez, Francisco
    Tibouchi, Mehdi
    SELECTED AREAS IN CRYPTOGRAPHY, 2022, 13203 : 441 - 460
  • [9] Effective Pairings in Isogeny-Based Cryptography
    Reijnders, Krijn
    PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023, 2023, 14168 : 109 - 128
  • [10] How Not to Create an Isogeny-Based PAKE
    Azarderakhsh, Reza
    Jao, David
    Koziel, Brian
    LeGrow, Jason T.
    Soukharev, Vladimir
    Taraskin, Oleg
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 169 - 186