Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
SCALLOP: scaling the CSI-FiSh
We present SCALLOP: SCALable isogeny action based on Oriented supersingular curves
with Prime conductor, a new group action based on isogenies of supersingular curves …
with Prime conductor, a new group action based on isogenies of supersingular curves …
A new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor sampling
R del Pino, S Katsumata - Annual International Cryptology Conference, 2022 - Springer
Blind signatures, proposed by Chaum (CRYPTO'82), are interactive protocols between a
signer and a user, where a user can obtain a signature without revealing the message to be …
signer and a user, where a user can obtain a signature without revealing the message to be …
Message linkable group signature with information binding and efficient revocation for privacy-preserving announcement in VANETs
In vehicular ad hoc networks (VANETs), the broadcasting of fake announcement messages
by malicious vehicles can potentially misguide nearby vehicles. Ensuring the trustworthiness …
by malicious vehicles can potentially misguide nearby vehicles. Ensuring the trustworthiness …
CSI-otter: Isogeny-based (partially) blind signatures from the class group action with a twist
S Katsumata, YF Lai, JT LeGrow, L Qin - Designs, Codes and …, 2024 - Springer
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature
scheme. While at a high level the scheme resembles the Schnorr blind signature, our work …
scheme. While at a high level the scheme resembles the Schnorr blind signature, our work …
Universal composable password authenticated key exchange for the post-quantum world
In this paper, we construct the first password authenticated key exchange (PAKE) scheme
from isogenies with Universal Composable (UC) security in the random oracle model …
from isogenies with Universal Composable (UC) security in the random oracle model …
New proof systems and an OPRF from CSIDH
Isogeny computations in CSIDH (Asiacrypt 2018) are described using a commutative group
G acting on the set of supersingular elliptic curves. The commutativity property gives CSIDH …
G acting on the set of supersingular elliptic curves. The commutativity property gives CSIDH …
Sphinx-in-the-head: group signatures from symmetric primitives
Group signatures and their variants have been widely used in privacy-sensitive scenarios
such as anonymous authentication and attestation. In this paper, we present a new post …
such as anonymous authentication and attestation. In this paper, we present a new post …
Efficient isogeny proofs using generic techniques
Generating supersingular elliptic curves of unknown endomorphism ring has been a
problem vexing isogeny-based cryptographers for several years. A recent development has …
problem vexing isogeny-based cryptographers for several years. A recent development has …
[HTML][HTML] Revocable ring signatures with CCA-anonymity from standard lattices
Ring signatures are significant cryptographic primitives used for anonymous authentication
due to their anonymity and spontaneity. However, in some scenarios, they may offer …
due to their anonymity and spontaneity. However, in some scenarios, they may offer …
CAPYBARA and TSUBAKI: verifiable random functions from group actions and isogenies
YF Lai - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this work, we introduce two post-quantum Verifiable Random Function (VRF)
constructions based on abelian group actions and isogeny group actions with a twist. The …
constructions based on abelian group actions and isogeny group actions with a twist. The …