Linked e-resources
Details
Table of Contents
Intro
Preface
Organization
Contents
Multicast Key Agreement, Revisited
1 Introduction
1.1 Contributions
2 Preliminaries
3 Multicast Key Agreement
3.1 MKA Syntax
3.2 MKA Efficiency Measures
3.3 MKA Security
4 MKA Construction
4.1 MKA Trees
4.2 GUS MKA Protocol
4.3 Security of GUS MKA Protocol
4.4 Comparison of Trees in GUS
5 Adding Security for Group Manager Corruptions
5.1 Group Manager State Separation and Efficiency Measures
5.2 MKA Security with Group Manager FS and Eventual PCS
References
A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption
1 Introduction
2 Definitions
2.1 Signature Schemes
2.2 Intractability Assumptions
3 Prior Art
3.1 The EDL Family of Signatures
3.2 Boneh-Boyen Signatures
3.3 Existing Pairing-Free Discrete-Log Signature Schemes in the Standard Model
3.4 OR-Based Signature Schemes
4 Our Signature Scheme
4.1 Intuition of the Design
4.2 Description
4.3 Introducing Discrete-Log Collisions
4.4 Security Proof
5 Conclusion
References
Faster Isogenies for Post-quantum Cryptography: SIKE
1 Introduction
2 Preliminaries: Isogenies on Elliptic Curves
2.1 Isogeny-Based Cryptography
2.2 Supersingular Isogeny Key Encapsulation
3 Proposed Method for Large-Degree Isogenies of Odd Power Degree
3.1 Large-Degree Isogenies
3.2 Large-Degree Isogenies of an Odd Power
4 Proposed Explicit Formulas for Large-Degree Isogenies
4.1 Proposed Efficient Algorithm for Large-Degree Isogenies with a Remainder
4.2 Proposed Faster 2-Isogeny Formulas for Large-Degree Isogenies
5 Benchmarking and Evaluation
6 Conclusion
5 A Hybrid Strategy for Radical Isogenies
5.1 A Hybrid Strategy for Integration of Radical Isogenies
5.2 Choosing Parameters for Hybrid Strategy
5.3 Algorithm for Evaluation of Hybrid Strategy
6 Implementation and Performance Benchmark
6.1 Performance Benchmark of Radical Isogenies
6.2 Performance of Radical Isogenies Using the Hybrid Strategy
7 Concluding Remarks and Future Research
References
Private Liquidity Matching Using MPC
1 Introduction
2 Preliminaries
2.1 The Gridlock Resolution Problem
2.2 Multiparty Computation (MPC)
Preface
Organization
Contents
Multicast Key Agreement, Revisited
1 Introduction
1.1 Contributions
2 Preliminaries
3 Multicast Key Agreement
3.1 MKA Syntax
3.2 MKA Efficiency Measures
3.3 MKA Security
4 MKA Construction
4.1 MKA Trees
4.2 GUS MKA Protocol
4.3 Security of GUS MKA Protocol
4.4 Comparison of Trees in GUS
5 Adding Security for Group Manager Corruptions
5.1 Group Manager State Separation and Efficiency Measures
5.2 MKA Security with Group Manager FS and Eventual PCS
References
A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption
1 Introduction
2 Definitions
2.1 Signature Schemes
2.2 Intractability Assumptions
3 Prior Art
3.1 The EDL Family of Signatures
3.2 Boneh-Boyen Signatures
3.3 Existing Pairing-Free Discrete-Log Signature Schemes in the Standard Model
3.4 OR-Based Signature Schemes
4 Our Signature Scheme
4.1 Intuition of the Design
4.2 Description
4.3 Introducing Discrete-Log Collisions
4.4 Security Proof
5 Conclusion
References
Faster Isogenies for Post-quantum Cryptography: SIKE
1 Introduction
2 Preliminaries: Isogenies on Elliptic Curves
2.1 Isogeny-Based Cryptography
2.2 Supersingular Isogeny Key Encapsulation
3 Proposed Method for Large-Degree Isogenies of Odd Power Degree
3.1 Large-Degree Isogenies
3.2 Large-Degree Isogenies of an Odd Power
4 Proposed Explicit Formulas for Large-Degree Isogenies
4.1 Proposed Efficient Algorithm for Large-Degree Isogenies with a Remainder
4.2 Proposed Faster 2-Isogeny Formulas for Large-Degree Isogenies
5 Benchmarking and Evaluation
6 Conclusion
5 A Hybrid Strategy for Radical Isogenies
5.1 A Hybrid Strategy for Integration of Radical Isogenies
5.2 Choosing Parameters for Hybrid Strategy
5.3 Algorithm for Evaluation of Hybrid Strategy
6 Implementation and Performance Benchmark
6.1 Performance Benchmark of Radical Isogenies
6.2 Performance of Radical Isogenies Using the Hybrid Strategy
7 Concluding Remarks and Future Research
References
Private Liquidity Matching Using MPC
1 Introduction
2 Preliminaries
2.1 The Gridlock Resolution Problem
2.2 Multiparty Computation (MPC)