SCALLOP: scaling the CSI-FiSh

LD Feo, TB Fouotsa, P Kutas, A Leroux… - … conference on public …, 2023 - Springer
We present SCALLOP: SCALable isogeny action based on Oriented supersingular curves
with Prime conductor, a new group action based on isogenies of supersingular curves …

A new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor sampling

R del Pino, S Katsumata - Annual International Cryptology Conference, 2022 - Springer
Blind signatures, proposed by Chaum (CRYPTO'82), are interactive protocols between a
signer and a user, where a user can obtain a signature without revealing the message to be …

Message linkable group signature with information binding and efficient revocation for privacy-preserving announcement in VANETs

L Zhang, J Li, Y Yang - IEEE Transactions on Dependable and …, 2024 - ieeexplore.ieee.org
In vehicular ad hoc networks (VANETs), the broadcasting of fake announcement messages
by malicious vehicles can potentially misguide nearby vehicles. Ensuring the trustworthiness …

CSI-otter: Isogeny-based (partially) blind signatures from the class group action with a twist

S Katsumata, YF Lai, JT LeGrow, L Qin - Designs, Codes and …, 2024 - Springer
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature
scheme. While at a high level the scheme resembles the Schnorr blind signature, our work …

Universal composable password authenticated key exchange for the post-quantum world

Y Lyu, S Liu, S Han - Annual International Conference on the Theory and …, 2024 - Springer
In this paper, we construct the first password authenticated key exchange (PAKE) scheme
from isogenies with Universal Composable (UC) security in the random oracle model …

New proof systems and an OPRF from CSIDH

C Delpech de Saint Guilhem, R Pedersen - IACR International Conference …, 2024 - Springer
Isogeny computations in CSIDH (Asiacrypt 2018) are described using a commutative group
G acting on the set of supersingular elliptic curves. The commutativity property gives CSIDH …

Sphinx-in-the-head: group signatures from symmetric primitives

L Chen, C Dong, CJP Newton, Y Wang - ACM transactions on privacy …, 2024 - dl.acm.org
Group signatures and their variants have been widely used in privacy-sensitive scenarios
such as anonymous authentication and attestation. In this paper, we present a new post …

Efficient isogeny proofs using generic techniques

K Cong, YF Lai, S Levin - … on Applied Cryptography and Network Security, 2023 - Springer
Generating supersingular elliptic curves of unknown endomorphism ring has been a
problem vexing isogeny-based cryptographers for several years. A recent development has …

[HTML][HTML] Revocable ring signatures with CCA-anonymity from standard lattices

J Wen, W Susilo, R Yang, Z Yu, H Zhang - Computer Standards & Interfaces, 2025 - Elsevier
Ring signatures are significant cryptographic primitives used for anonymous authentication
due to their anonymity and spontaneity. However, in some scenarios, they may offer …

CAPYBARA and TSUBAKI: verifiable random functions from group actions and isogenies

YF Lai - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this work, we introduce two post-quantum Verifiable Random Function (VRF)
constructions based on abelian group actions and isogeny group actions with a twist. The …