A post-quantum signcryption scheme using isogeny based cryptography

被引:3
|
作者
Dey, Kunal [1 ]
Debnath, Sumit Kumar [1 ,2 ]
Stanica, Pantelimon [3 ]
Srivastava, Vikas [1 ]
机构
[1] Natl Inst Technol Jamshedpur, Dept Math, Jamshedpur 831014, Bihar, India
[2] Indian Inst Informat Technol Kalyani, Dept Math, Kalyani 741235, W Bengal, India
[3] Naval Postgrad Sch, Dept Appl Math, Monterey, CA 93943 USA
关键词
Isogeny based cryptography; Post-quantum cryptography; Digital signature; Public key encryption; Signcryption; LATTICE;
D O I
10.1016/j.jisa.2022.103280
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signcryption is an important cryptographic scheme which is used for both confidentiality and unforgeability. It has many interesting practical applications. Enormous growth of quantum computers makes a warning to the existing classical signcryption schemes due to Shor's algorithm. As a result, designing signcryption schemes, which can withstand quantum attack, is an interesting direction of research. Isogeny based cryptography (IBC) is an ideal post-quantum candidate that can be employed to build a quantum computer immune signcryption scheme. Less communication cost and a smaller public key is the main advantage of IBC compared to other post quantum cryptographic branches. In this paper, we design the first signcryption employing IBC. Our scheme is relying on three hard problems: Commutative Supersingular Isogeny Decisional Diffie-Hellman (CSSIDDH), Group Action Inverse Problem (GAIP) and Commutative Supersingular Isogeny Knowledge of Exponent (CSSIKOE). It achieves IND - CCA and EUF - CMA security. Ciphertext size in this scheme turns out to be 16622.05 bytes for p(128) and 12757.45 bytes for p(256) to achieve NIST-1 level of security.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Isogeny-Based Cryptography: A Promising Post-Quantum Technique
    Peng, Cong
    Chen, Jianhua
    Zeadally, Sherali
    He, Debiao
    IT PROFESSIONAL, 2019, 21 (06) : 27 - 32
  • [2] A Novel Modular Multiplier for Isogeny-Based Post-Quantum Cryptography
    Wu, Bo
    Tian, Jing
    Hu, Xiao
    Wang, Zhongfeng
    2020 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2020), 2020, : 334 - 339
  • [3] Fast Modular Multipliers for Supersingular Isogeny-Based Post-Quantum Cryptography
    Tian, Jing
    Lin, Jun
    Wang, Zhongfeng
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (02) : 359 - 371
  • [4] A Video Steganography Scheme Based on Post-Quantum Cryptography
    Huang, Yiming
    Lei, Zhongkui
    Song, Zhufu
    Guo, Yueru
    Li, Yihang
    2021 IEEE INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING (ICICSE 2021), 2021, : 83 - 87
  • [5] New Post-quantum Blockchain Privacy Protection Scheme Based on the Signcryption
    Yu, Wang-Ke
    Cheng, Xi-En
    International Journal of Network Security, 2023, 25 (03) : 495 - 501
  • [6] Post-quantum blind signcryption scheme from lattice
    Yu, Huifang
    Bai, Lu
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2021, 22 (06) : 891 - 901
  • [7] Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography
    Tian, Jing
    Lin, Jun
    Wang, Zhongfeng
    PROCEEDINGS OF THE 2019 IEEE INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING SYSTEMS (SIPS 2019), 2019, : 97 - 102
  • [8] Post-Quantum Cryptography
    Monroe, Don
    COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [9] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    NATURE, 2017, 549 (7671) : 188 - 194
  • [10] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    Nature, 2017, 549 : 188 - 194