政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/147040
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 110206/141131 (78%)
Visitors : 46886381      Online Users : 576
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/147040

    Title: 基於同源密碼學之簽章方案相關研究
    Supersingular Isogeny-Based Signatures: A survey
    Authors: 李立瑜
    Lee, Li-Yu
    Contributors: 蔡炎龍
    Tsai, Yen-lung
    Lee, Li-Yu
    Keywords: 後量子密碼學
    Post-quantum Cryptography
    Isogeny Based Cryptography
    elliptic curve
    signature schemes
    Date: 2023
    Issue Date: 2023-09-01 15:26:23 (UTC+8)
    Abstract: 自2016年起,美國國家標準與技術局(NIST)提出了後量子密碼學標準化競賽,公開徵求面對量子電腦時代的公鑰加密和數位簽章系統。隨著競賽尾聲的來臨,特別是公鑰加密方案的標準化清單釋出和二次徵求數位簽章系統方案,後量子密碼學的研究重心逐漸轉向數位簽章方案的制定和安全性分析。基於同源性的密碼學,作為後量子密碼學中最新穎的分支,運用了大量的代數和橢圓曲線知識,與其他領域方案相比,極小的金鑰大小是一大優勢,且使用方法與現行的橢圓曲線密碼學相似。

    本研究旨在透過基於同源性的後量子數位簽章方案的調查,從NIST PQC競賽的現況出發,介紹基礎密碼學的數學背景、同源密碼學所需的數學知識,並分析這些數位簽章方案的內容、安全性和實作效能考量,期望能促使更多人投入同源密碼學的研究。
    Since 2016, the U.S. National Institute of Standards and Technology (NIST) initiated the post-quantum cryptography standardization competition, publicly soliciting public key encryption and digital signature systems for the quantum computing era. As the competition draws to a close, especially with the release of the standardization list for public key encryption schemes and the second call for digital signature system proposals, the research focus of post-quantum cryptography has gradually shifted to the formulation and security analysis of digital signature schemes. Isogeny-based cryptography, as the most novel branch in post-quantum cryptography, employs a wealth of algebraic and elliptic curve knowledge. Compared to schemes from other domains, its extremely small key size is a significant advantage, and its usage is similar to current elliptic curve cryptography.

    This study aims to investigate post-quantum digital signature schemes based on isogenies. Starting from the current status of the NIST PQC competition, we introduce the mathematical background of basic cryptography, the mathematical knowledge required for isogeny-based cryptography, and analyze the content, security, and implementation performance considerations of these digital signature schemes. We hope to encourage more people to delve into research in this field.
    Reference: [1] Shahla Atapoor, Karim Baghery, Daniele Cozzo, and Robi Pedersen. Csi-shark: Csi-fish with sharing-friendly keys. Cryptology ePrint Archive, Paper 2022/1189, 2022. https: //eprint.iacr.org/2022/1189.
    [2] Ward Beullens, Lucas Disson, Robi Pedersen, and Frederik Vercauteren. Csi-rashi: Distributed key generation for csidh. Cryptology ePrint Archive, Paper 2020/1323, 2020. https://eprint.iacr.org/2020/1323.
    [3] Ward Beullens, Thorsten Kleinjung, and Frederik Vercauteren. Csi-fish: Efficient isogeny based signatures through class group computations. Cryptology ePrint Archive, Paper 2019/498, 2019. https://eprint.iacr.org/2019/498.
    [4] Dan Boneh, Jiaxin Guan, and Mark Zhandry. A lower bound on the length of signatures based on group actions and generic isogenies. Cryptology ePrint Archive, Paper 2023/250, 2023. https://eprint.iacr.org/2023/250.
    [5] WouterCastryckandThomasDecru.Anefficientkeyrecoveryattackonsidh.Cryptology ePrint Archive, Paper 2022/975, 2022. https://eprint.iacr.org/2022/975.
    [6] Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes. Csidh: An efficient post-quantum commutative group action. Cryptology ePrint Archive, Paper 2018/383, 2018. https://eprint.iacr.org/2018/383.
    [7] Jean-Marc Couveignes. Hard homogeneous spaces. Cryptology ePrint Archive, Paper 2006/291, 2006. https://eprint.iacr.org/2006/291.
    [8] Daniele Cozzo and Nigel P. smart. Sashimi: Cutting up csi-fish secret keys to produce an actively secure distributed signing protocol. Cryptology ePrint Archive, Paper 2019/1360, 2019. https://eprint.iacr.org/2019/1360.
    [9] Thomas Decru, Lorenz Panny, and Frederik Vercauteren. Faster seasign signatures through improved rejection sampling. Cryptology ePrint Archive, Paper 2018/1109, 2018. https://eprint.iacr.org/2018/1109.
    [10] W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644–654, 1976.
    [11] Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, and Benjamin Wesolowski. Scallop: scaling the csi-fish. Cryptology ePrint Archive, Paper 2023/058, 2023. https://eprint.iacr.org/2023/058.
    [12] Luca De Feo and Steven D. Galbraith. Seasign: Compact isogeny signatures from class group actions. Cryptology ePrint Archive, Paper 2018/824, 2018. https://eprint. iacr.org/2018/824.
    [13] LucaDeFeo,DavidJao,andJérômePlût.Towardsquantum-resistantcryptosystemsfrom supersingular elliptic curve isogenies. Cryptology ePrint Archive, Paper 2011/506, 2011. https://eprint.iacr.org/2011/506.
    [14] LucaDeFeo,DavidJao,andJérômePlût.Towardsquantum-resistantcryptosystemsfrom supersingular elliptic curve isogenies. Journal of Mathematical Cryptology, 8(3):209–247, 2014.
    [15] LucaDeFeo,DavidKohel,AntoninLeroux,ChristophePetit,andBenjaminWesolowski. Sqisign: compact post-quantum signatures from quaternions and isogenies. Cryptology ePrint Archive, Paper 2020/1240, 2020. https://eprint.iacr.org/2020/ 1240.
    [16] Luca De Feo and Michael Meyer. Threshold schemes from isogeny assumptions. Cryptology ePrint Archive, Paper 2019/1288, 2019. https://eprint.iacr.org/ 2019/1288.
    [17] Steven D. Galbraith, Christophe Petit, and Javier Silva. Identification protocols and signature schemes based on supersingular isogeny problems. Cryptology ePrint Archive, Paper 2016/1154, 2016. https://eprint.iacr.org/2016/1154.

    [18] Shah Muhammad Hamdi, Syed Zuhori, Firoz Mahmud, and Biprodip Pal. A compare between shor’s quantum factoring algorithm and general number field sieve. 04 2014.
    [19] Ali El Kaafarani, Shuichi Katsumata, and Federico Pintore. Lossy csi-fish: Efficient signature scheme with tight reduction to decisional csidh-512. Cryptology ePrint Archive, Paper 2020/124, 2020. https://eprint.iacr.org/2020/124.
    [20] David Kohel, Kristin Lauter, Christophe Petit, and Jean-Pierre Tignol. On the quaternion l-isogeny path problem. Cryptology ePrint Archive, Paper 2014/505, 2014. https: //eprint.iacr.org/2014/505.
    [21] Vadim Lyubashevsky. Fiat-shamir with aborts: Applications to lattice and factoring-based signatures. In Mitsuru Matsui, editor, Advances in Cryptology – ASIACRYPT 2009, pages 598–616, Berlin, Heidelberg, 2009. Springer Berlin Heidelberg.
    [22] Luciano Maino, Chloe Martindale, Lorenz Panny, Giacomo Pope, and Benjamin Wesolowski. A direct key recovery attack on sidh. Cryptology ePrint Archive, Paper 2023/640, 2023. https://eprint.iacr.org/2023/640.
    [23] Rodney Van Meter, Kohei M. Itoh, and Thaddeus D. Ladd. Architecture-dependent execution time of shor’s algorithm, 2006.
    [24] Damien Robert. Breaking sidh in polynomial time. Cryptology ePrint Archive, Paper 2022/1038, 2022. https://eprint.iacr.org/2022/1038.
    [25] Joseph H Silverman. The Arithmetic of Elliptic Curves. Graduate texts in mathematics. Springer, Dordrecht, 2009.
    [26] Anton Stolbunov. Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves, 2010.
    [27] Anton Stolbunov. Cryptographic Schemes Based on Isogenies. PhD thesis, 01 2012.
    [28] J.TATE.Endomorphismsofabelianvarietiesoverfinitefields.Inventionesmathematicae,
    2:134–144, 1966.
    [29] J. Vélu. Isogénies entre courbes elliptiques. Comptes-Rendus de l’Académie des Sciences,
    Série I, 273:238–241, juillet 1971.

    [30] Lawrence C. Washington. Elliptic curves : number theory and cryptography. CRC Press, 2003.
    [31] Thom Wiggers, Lance Roy, and stefanritterhoff. Pq signatures zoo.
    [32] Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, and Vladimir Soukharev. A post-quantum digital signature scheme based on supersingular isogenies. Cryptology ePrint Archive, Paper 2017/186, 2017. https://eprint.iacr.org/2017/186.
    Description: 碩士
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0110751007
    Data Type: thesis
    Appears in Collections:[Department of Mathematical Sciences] Theses

    Files in This Item:

    File SizeFormat

    All items in 政大典藏 are protected by copyright, with all rights reserved.

    社群 sharing

    著作權政策宣告 Copyright Announcement
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback