Isogeny-Based Cryptographic Access Control

被引:3
|
作者
Aleksandrova, E. B. [1 ]
Shtyrkina, A. A. [1 ]
Yarmak, A., V [1 ]
机构
[1] Peter Great St Petersburg Polytech Univ, St Petersburg 195251, Russia
关键词
cryptography; postquantum cryptography; cryptographic access control; elliptic curves; isogenies of elliptic curves; SECURITY; SYSTEM;
D O I
10.3103/S0146411620080027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic access control is a relatively new concept that implements the access control rules of some subjects to an object using cryptographic primitives. A quantum computer of sufficient capacity allows solving in polynomial time the discrete logarithm and integer factorization problems, which are the basis of most modern public-key cryptosystems. In this regard, there is a need to search for new problems that are resistant to attacks on both classical computers and quantum computers. Computing the isogenies of supersingular elliptic curves is one of the most challenging problems. A scheme for cryptographic access control based on isogenies is proposed. Security analysis of the protocol and the results of practical implementation in the SAGE computer algebra system are given.
引用
收藏
页码:803 / 812
页数:10
相关论文
共 50 条
  • [21] Isogeny-Based Quantum-Resistant Undeniable Signatures
    Jao, David
    Soukharev, Vladimir
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 160 - 179
  • [22] Optimized Arithmetic Operations for Isogeny-Based Cryptography on Huff Curves
    Huang, Yan
    Zhang, Fangguo
    Hu, Zhi
    Liu, Zhijie
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 23 - 40
  • [23] ISH: Isogeny-based Secret Handshakes with friendly communication costs
    Chen, Chao
    Zhang, Fangguo
    An, Zhiyuan
    Zhang, Jing
    COMPUTER STANDARDS & INTERFACES, 2025, 91
  • [24] Faster modular arithmetic for isogeny-based crypto on embedded devices
    Joppe W. Bos
    Simon J. Friedberger
    Journal of Cryptographic Engineering, 2020, 10 : 97 - 109
  • [25] An Isogeny-based Quantum-Resistant Secret Sharing Scheme
    Eslami, Khadijeh
    Bahramian, Mojtaba
    FILOMAT, 2022, 36 (10) : 3249 - 3258
  • [26] Practical Isogeny-Based Key-Exchange with Optimal Tightness
    de Kock, Bor
    Gjosteen, Kristian
    Veroni, Mattia
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 451 - 479
  • [27] Isogeny-Based Cryptography: A Promising Post-Quantum Technique
    Peng, Cong
    Chen, Jianhua
    Zeadally, Sherali
    He, Debiao
    IT PROFESSIONAL, 2019, 21 (06) : 27 - 32
  • [28] Towards Isogeny-Based Password-Authenticated Key Establishment
    Taraskin, Oleg
    Soukharev, Vladimir
    Jao, David
    LeGrow, Jason T.
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) : 18 - 30
  • [29] PVCLS-SI: Isogeny-based Certificateless Signature Scheme
    Li, Li
    Xu, Maozhi
    2022 IEEE 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2022), 2022, : 632 - 637
  • [30] RippleSign: Isogeny-Based Threshold Ring Signatures with Combinatorial Methods
    Li, Li
    Xu, Maozhi
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 11 - 15