A post-quantum signcryption scheme using isogeny based cryptography

被引:3
|
作者
Dey, Kunal [1 ]
Debnath, Sumit Kumar [1 ,2 ]
Stanica, Pantelimon [3 ]
Srivastava, Vikas [1 ]
机构
[1] Natl Inst Technol Jamshedpur, Dept Math, Jamshedpur 831014, Bihar, India
[2] Indian Inst Informat Technol Kalyani, Dept Math, Kalyani 741235, W Bengal, India
[3] Naval Postgrad Sch, Dept Appl Math, Monterey, CA 93943 USA
关键词
Isogeny based cryptography; Post-quantum cryptography; Digital signature; Public key encryption; Signcryption; LATTICE;
D O I
10.1016/j.jisa.2022.103280
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signcryption is an important cryptographic scheme which is used for both confidentiality and unforgeability. It has many interesting practical applications. Enormous growth of quantum computers makes a warning to the existing classical signcryption schemes due to Shor's algorithm. As a result, designing signcryption schemes, which can withstand quantum attack, is an interesting direction of research. Isogeny based cryptography (IBC) is an ideal post-quantum candidate that can be employed to build a quantum computer immune signcryption scheme. Less communication cost and a smaller public key is the main advantage of IBC compared to other post quantum cryptographic branches. In this paper, we design the first signcryption employing IBC. Our scheme is relying on three hard problems: Commutative Supersingular Isogeny Decisional Diffie-Hellman (CSSIDDH), Group Action Inverse Problem (GAIP) and Commutative Supersingular Isogeny Knowledge of Exponent (CSSIKOE). It achieves IND - CCA and EUF - CMA security. Ciphertext size in this scheme turns out to be 16622.05 bytes for p(128) and 12757.45 bytes for p(256) to achieve NIST-1 level of security.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
  • [22] Post-quantum cryptography and the quantum future of cybersecurity
    Liu, Yi-Kai
    Moody, Dustin
    PHYSICAL REVIEW APPLIED, 2024, 21 (04):
  • [23] Efficient Finite Field Multiplication for Isogeny Based Post Quantum Cryptography
    Karmakar, Angshuman
    Roy, Sujoy Sinha
    Vercauteren, Frederik
    Verbauwhede, Ingrid
    ARITHMETIC OF FINITE FIELDS, WAIFI 2016, 2016, 10064 : 193 - 207
  • [24] A Mathematical Perspective on Post-Quantum Cryptography
    Richter, Maximilian
    Bertram, Magdalena
    Seidensticker, Jasper
    Tschache, Alexander
    MATHEMATICS, 2022, 10 (15)
  • [25] EasyPQC: Verifying Post-Quantum Cryptography
    Barbosa, Manuel
    Barthe, Gilles
    Fan, Xiong
    Gregoire, Benjamin
    Hung, Shih-Han
    Katz, Jonathan
    Strub, Pierre-Yves
    Wu, Xiaodi
    Zhou, Li
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2564 - 2586
  • [26] Implementing Post-quantum Cryptography for Developers
    Hekkala J.
    Muurman M.
    Halunen K.
    Vallivaara V.
    SN Computer Science, 4 (4)
  • [27] Post-Quantum Cryptography in Embedded Systems
    Marzougui, Soundes
    Kraemer, Juliane
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [28] Benchmarking Post-quantum Cryptography in TLS
    Paquin, Christian
    Stebila, Douglas
    Tamvada, Goutam
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2020, 2020, 12100 : 72 - 91
  • [29] Post-quantum cryptography for automotive systems
    Fritzmann T.
    Vith J.
    Flórez D.
    Sepúlveda J.
    Microprocessors and Microsystems, 2021, 87
  • [30] Post-Quantum Cryptography in MPSoC Environments
    Sepulveda, Johanna
    Winkler, Dominik
    Sepulveda, Daniel
    Cupelli, Mario
    Olexa, Radek
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 224 - 229