Investigation of the Structure of the Isogeny Graph for Postquantum Cryptography Protocols
Abstract
Abstract
References
Recommendations
Verifiable Isogeny Walks: Towards an Isogeny-Based Postquantum VDF
Selected Areas in CryptographyAbstractIn this paper, we investigate the problem of constructing postquantum-secure verifiable delay functions (VDFs), particularly based on supersingular isogenies. Isogeny-based VDF constructions have been proposed before, but since verification relies ...
Loops of isogeny graphs of supersingular elliptic curves at j = 0
AbstractWe improve Adj et al.'s bound in [1, Theorem 12] from p > 4 ℓ to p > 3 ℓ for the loops of E 0 : y 2 = x 3 + 1 in the ℓ-isogeny graph G ℓ ( F p 2 , − 2 p ) of supersingular elliptic curves over F p 2 with trace − 2 p.
Isogeny-Based Cryptographic Access Control
Abstract—Cryptographic access control is a relatively new concept that implements the access control rules of some subjects to an object using cryptographic primitives. A quantum computer of sufficient capacity allows solving in polynomial time the ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Allerton Press, Inc.
United States
Publication History
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0