CINXE.COM

Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies

<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <link href="/css/bootstrap/css/bootstrap.min.css" rel="stylesheet"> <script src="/css/bootstrap/js/bootstrap.bundle.min.js"></script> <title>Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies</title> <link rel="stylesheet" href="/css/iacrcc.css"> <link rel="icon" type="image/png" href="/favicon.ico"> <style> div.authorname { font-weight: 500; margin-bottom: .3rem; } div.author { margin-bottom: 1rem; } span.keyword { font-weight: 500; } span.keyword a { color: black; } div.reference { margin-bottom: .5rem; } ol.bib li:before { margin-left: -1.5rem; content: "[" counter(bcounter) "] "; margin-right: .5rem; } ol.bib { list-style: none; counter-reset: bcounter; } ol.bib li { counter-increment: bcounter; margin-bottom: .5rem; } .card-header { background-color: #d1e7dd !important; } .authorlist { /* border: 1px solid #aaa; padding: 1rem; margin-bottom: 1rem; background-color: white;*/ } </style> <script> MathJax = { tex: { inlineMath: [['$', '$'], ['\\(', '\\)']], displayMath: [ ['$$','$$'], ["\\[","\\]"] ], processEnvironments: false, processEscapes: true }, "HTML-CSS": { linebreaks: { automatic: true } } }; </script> <script id="MathJax-script" async src="/js/mathjax/tex-chtml.js"></script> <link rel="schema.DC" href="http://purl.org/dc/elements/1.1/"> <meta name="DC.Creator.PersonalName" content="Giacomo Borin"> <meta name="DC.Creator.PersonalName" content="Yi-Fu Lai"> <meta name="DC.Creator.PersonalName" content="Antonin Leroux"> <meta name="DC.Date.created" content="2025-01-13 16:12:07"> <meta name="DC.Date.dateSubmitted" content="2024-07-09"> <meta name="DC.Date.dateAccepted" content="2024-12-03"> <meta name="DC.Description" xml:lang="en" lang="en" content="&lt;p&gt; We construct two efficient post-quantum ring signatures with anonymity against full key exposure from isogenies, addressing the limitations of existing isogeny-based ring signatures.&lt;/p&gt;&lt;p&gt; First, we present an efficient concrete distinguisher for the SQIsign simulator when the signing key is provided using one transcript. This shows that turning SQIsign into an efficient full anonymous ring signature requires some new ideas.&lt;/p&gt;&lt;p&gt; Second, we propose a variant of SQIsign (Asiacrypt&#39;20) that is resistant to the distinguisher attack with only a x1.4 increase in size and we render it to a ring signature, that we refer to as Erebor. This variant introduces a new zero-knowledge assumption that ensures full anonymity. The efficiency of Erebor remains comparable to that of SQIsign, with only a proportional increase due to the ring size. This results in a signature size of 0.71 KB for 4 users and 1.41 KB for 8 users, making it the most compact post-quantum ring signature for up to 29 users.&lt;/p&gt;&lt;p&gt; Third, we revisit the GPS signature scheme (Asiacrypt&#39;17), developing efficient subroutines to make the scheme more efficient and significantly reduce the resulting signature size. By integrating our scheme with the paradigm by Beullens, Katsumata, and Pintore (Asiacrypt’20), we achieve an efficient logarithmic ring signature, that we call Durian, resulting in a signature size of 9.87 KB for a ring of size 1024.&lt;/p&gt;"> <meta name="DC.Format" content="application/pdf"> <meta name="DC.Identifier.DOI" content="10.62056/ava3zivrzn"> <meta name="DC.Identifier.URI" content="https://cic.iacr.org/p/1/4/4"> <meta name="DC.Language" content="en"> <meta name="DC.Rights" content="Copyright (c) 2023 held by author(s)"> <meta name="DC.Rights" content="https://creativecommons.org/licenses/by/4.0/"> <meta name="DC.Source" content="IACR Communications in Cryptology"> <meta name="DC.Source.ISSN" content="3006-5496"> <meta name="DC.Source.Issue" content="4"> <meta name="DC.Source.Volume" content="1"><meta name="DC.Title" content="Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies"> <meta name="DC.Type" content="Text.Serial.Journal"> <meta name="DC.Type.articleType" content="Articles"> <meta name="citation_journal_title" content="IACR Communications in Cryptology"> <meta name="citation_journal_abbrev" content="CiC"> <meta name="citation_issn" content="3006-5496"><meta name="citation_author" content="Giacomo Borin"> <meta name="citation_author_institution" content="IBM Research - Zurich"> <meta name="citation_author_institution" content="University of Zurich"> <meta name="citation_author" content="Yi-Fu Lai"> <meta name="citation_author_institution" content="Ruhr University Bochum"> <meta name="citation_author" content="Antonin Leroux"> <meta name="citation_author_institution" content="DGA Maitrise de l&#39;information"> <meta name="citation_author_institution" content="Université de Rennes"> <meta name="citation_title" content="Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies"> <meta name="citation_language" content="en"> <meta name="citation_date" content="2025-01-13"> <meta name="citation_volume" content="1"> <meta name="citation_issue" content="4"> <meta name="citation_doi" content="10.62056/ava3zivrzn"> <meta name="citation_abstract_html_url" content="https://cic.iacr.org/p/1/4/4"> <meta name="citation_pdf_url" content="https://cic.iacr.org/p/1/4/4/pdf"> </head> <body> <noscript> <h1 class="text-center">What a lovely hat</h1> <h4 class="text-center">Is it made out of <a href="https://iacr.org/tinfoil.html">tin foil</a>?</h4> </noscript> <div class="pageTop d-flex justify-content-md-around justify-content-between align-items-center"> <a href="https://iacr.org"><img id="logo" class="d-none d-lg-block ms-5" src="/images/iacrlogo_small.png" title="International Association for Cryptologic Research" alt="IACR logo"></a> <span class="headerTitle d-none d-md-block">Communications in Cryptology</span> <span class="headerTitle d-md-none">IACR CiC</span> <div class="dropdown ps-lg-2 me-5"> <button class="btn border-0" type="button" id="dropdownMenuButton1" data-bs-toggle="dropdown" aria-expanded="true"> <img src="/images/search.svg" class="searchIcon" alt="Search Button" style="width:33px;"> </button> <div id="searchDd" class="dropdown-menu dropdown-menu-end bg-transparent border-0" aria-labelledby="dropdownMenuButton1" data-bs-popper="none"> <form action="/search" method="GET" class="me-3"> <div class="input-group"> <input id="searchbox" name="q" type="search" class="form-control shadow-none" autocomplete="off" > <input type="hidden" name="d" value="/var/www/wsgi/cicjournal/webapp/search_index/xapian.db"> <button class="btn btn-outline-dark border border-dark input-group-append"> Search </button> </div> </form> <div id="results" class="bg-light"></div> </div> </div> </div> <nav id="sitenav" class="navbar navbar-expand-md"> <div class="container"> <button class="navbar-toggler" type="button" data-bs-toggle="collapse" data-bs-target="#collapseContent" aria-controls="collapseContent" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="collapse navbar-collapse" id="collapseContent"> <ul class="navbar-nav nav-fill w-100 justify-content-between"> <li class="nav-item"> <a class="nav-link active" aria-current="page" href="/">Home</a> </li> <li class="nav-item"> <a class="nav-link" href="/contents">Papers</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" role="button" data-bs-toggle="dropdown" aria-expanded="false"> Submissions </a> <ul class="dropdown-menu ms-3 ms-lg-5"> <li><a class="dropdown-item" href="/callforpapers">Call for papers</a></li> <li><a class="dropdown-item" href="/ethics">Publication ethics</a></li> <li><a class="dropdown-item" href="/irregular">Irregular submissions</a></li> <li><a class="dropdown-item" href="/conflicts">Conflict of interest</a></li> <li><a class="dropdown-item" href="/retraction">Retraction policy</a></li> </ul> </li> <li class="nav-item"> <a class="nav-link" href="/faq">FAQ</a> </li> <li class="nav-item"> <a class="nav-link" href="/contact">Contact</a> </li> <li class="nav-item"> <a class="nav-link" href="/board">Editorial board</a> </li> <li class="nav-item dropdown"> <a href="#" class="ms-md-5 nav-link dropdown-toggle" data-bs-toggle="dropdown"><img alt="Login" src="/images/user.svg"></a> <ul class="dropdown-menu"> <li><a href="/login" class="dropdown-item">Admin login</a></li> </ul> </li> </ul> </div> </div> </nav> <main id="mainContent" class="container"> <nav aria-label="breadcrumb" class="mt-3"> <ol class="breadcrumb"> <li class="breadcrumb-item"><a href="/">Home</a></li> <li class="breadcrumb-item"><a href="/v/1">Volume 1</a></li> <li class="breadcrumb-item"><a href="/i/1/4">Issue 4</a></li> <li class="breadcrumb-item active" aria-current="page">4</li> </ol> </nav> <h2>Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies</h2> <div class="row mt-3"> <div class="col-12 col-md-8"> <h3 class="mt-2">Authors</h3> <div class="fs-4 mb-4 mt-2 d-flex justify-content-between flex-column flex-lg-row"> <div>Giacomo Borin, Yi-Fu Lai, Antonin Leroux</div> <button role="button" aria-expanded="false" aria-controls="authorlist" class="ms-4 btn me-3 dropdown-toggle" data-bs-toggle="collapse" data-bs-target="#authorlist">Author Info</button> </div> <div id="authorlist" class="authorlist collapse"> <div class="author"> <div class="authorname">Giacomo Borin <a target="_blank" href="https://orcid.org/0009-0001-7311-3802"><img alt="ORCID" class="align-baseline orcidIcon" src="/images/orcid.svg"></a> </div> <div class="ms-4 mb-2"> IBM Research - Zurich, Rüschlikon, Switzerland<br> University of Zurich, Zurich, Switzerland<br> <span class="font-monospace">erebor at gbor dot in</span> </div> </div> <div class="author"> <div class="authorname">Yi-Fu Lai <a target="_blank" href="https://orcid.org/0000-0002-1346-9372"><img alt="ORCID" class="align-baseline orcidIcon" src="/images/orcid.svg"></a> </div> <div class="ms-4 mb-2"> Ruhr University Bochum, Bochum, Germany<br> <span class="font-monospace">yi-fu dot lai at rub dot de</span> </div> </div> <div class="author"> <div class="authorname">Antonin Leroux <a target="_blank" href="https://orcid.org/0009-0002-3737-0075"><img alt="ORCID" class="align-baseline orcidIcon" src="/images/orcid.svg"></a> </div> <div class="ms-4 mb-2"> DGA Maitrise de l&#39;information, Bruz, France<br> Université de Rennes, Rennes, France<br> <span class="font-monospace">antonin dot leroux at polytechnique dot org</span> </div> </div> </div> <h3 class="mt-4">Abstract</h3> <p><p> We construct two efficient post-quantum ring signatures with anonymity against full key exposure from isogenies, addressing the limitations of existing isogeny-based ring signatures.</p><p> First, we present an efficient concrete distinguisher for the SQIsign simulator when the signing key is provided using one transcript. This shows that turning SQIsign into an efficient full anonymous ring signature requires some new ideas.</p><p> Second, we propose a variant of SQIsign (Asiacrypt'20) that is resistant to the distinguisher attack with only a x1.4 increase in size and we render it to a ring signature, that we refer to as Erebor. This variant introduces a new zero-knowledge assumption that ensures full anonymity. The efficiency of Erebor remains comparable to that of SQIsign, with only a proportional increase due to the ring size. This results in a signature size of 0.71 KB for 4 users and 1.41 KB for 8 users, making it the most compact post-quantum ring signature for up to 29 users.</p><p> Third, we revisit the GPS signature scheme (Asiacrypt'17), developing efficient subroutines to make the scheme more efficient and significantly reduce the resulting signature size. By integrating our scheme with the paradigm by Beullens, Katsumata, and Pintore (Asiacrypt’20), we achieve an efficient logarithmic ring signature, that we call Durian, resulting in a signature size of 9.87 KB for a ring of size 1024.</p></p> <h3 class="mb-3">References</h3> <div class="d-flex"> <div style="min-width:9rem;">[AABN02]</div> <div><div id="ref-EC:AABN02" class="bibitem">Michel Abdalla, Jee Hea An and Mihir Bellare, and Chanathip Namprempre. From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. In Lars R. Knudsen, editor, <em>EUROCRYPT 2002</em>, volume 2332 of <em>LNCS</em>, pages 418–433. 2002. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/3-540-46035-7_28">10.1007/3-540-46035-7_28</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Michel+Abdalla+Jee+Hea+An+and+Mihir+Bellare+Chanathip+Namprempre+From+Identification+to+Signatures+via+the+Fiat-Shamir+Transform%3A+Minimizing+Assumptions+for+Security+and+Forward-Security+2002" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Michel+Abdalla+Jee+Hea+An+and+Mihir+Bellare+Chanathip+Namprempre&amp;title=From+Identification+to+Signatures+via+the+Fiat-Shamir+Transform%3A+Minimizing+Assumptions+for+Security+and+Forward-Security&amp;submittedafter=2001&amp;submittedbefore=2003" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[AOS02]</div> <div><div id="ref-AC:AbeOhkSuz02" class="bibitem">Masayuki Abe, Miyako Ohkubo, and Koutarou Suzuki. 1-out-of-n Signatures from a Variety of Keys. In Yuliang Zheng, editor, <em>ASIACRYPT 2002</em>, volume 2501 of <em>LNCS</em>, pages 415–432. December 2002. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/3-540-36178-2_26">10.1007/3-540-36178-2_26</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Masayuki+Abe+Miyako+Ohkubo+Koutarou+Suzuki+1-out-of-n+Signatures+from+a+Variety+of+Keys+2002" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Masayuki+Abe+Miyako+Ohkubo+Koutarou+Suzuki&amp;title=1-out-of-n+Signatures+from+a+Variety+of+Keys&amp;submittedafter=2001&amp;submittedbefore=2003" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BCC<sup>+</sup>23]</div> <div><div id="ref-EC:BCCDFLMPPW23" class="bibitem">Andrea Basso, Giulio Codogni, Deirdre Connolly, Luca De Feo, Tako Boris Fouotsa, Guido Maria Lido, Travis Morrison, Lorenz Panny, Sikhar Patranabis, and Benjamin Wesolowski. Supersingular Curves You Can Trust. In Carmit Hazay and Martijn Stam, editors, <em>EUROCRYPT 2023, Part II</em>, volume 14005 of <em>LNCS</em>, pages 405–437. April 2023. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-031-30617-4_14">10.1007/978-3-031-30617-4_14</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Andrea+Basso+Giulio+Codogni+Deirdre+Connolly+Luca+De+Feo+Tako+Boris+Fouotsa+Guido+Maria+Lido+Travis+Morrison+Lorenz+Panny+Sikhar+Patranabis+Benjamin+Wesolowski+Supersingular+Curves+You+Can+Trust+2023" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Andrea+Basso+Giulio+Codogni+Deirdre+Connolly+Luca+De+Feo+Tako+Boris+Fouotsa+Guido+Maria+Lido+Travis+Morrison+Lorenz+Panny+Sikhar+Patranabis+Benjamin+Wesolowski&amp;title=Supersingular+Curves+You+Can+Trust&amp;submittedafter=2022&amp;submittedbefore=2024" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BDF<sup>+</sup>25]</div> <div><div id="ref-sqisign2dw" class="bibitem">Andrea Basso, Pierrick Dartois, Luca De Feo, Antonin Leroux, Luciano Maino, Giacomo Pope, Damien Robert, and Benjamin Wesolowski. SQIsign2D–West. In Kai-Min Chung and Yu Sasaki, editors, <em>Advances in Cryptology – ASIACRYPT 2024</em>, pages 339–370, Singapore. 2025. Springer Nature Singapore. DOI: <a href="https://doi.org/10.1007/978-981-96-0891-1_11">10.1007/978-981-96-0891-1_11</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Andrea+Basso+Pierrick+Dartois+Luca+De+Feo+Antonin+Leroux+Luciano+Maino+Giacomo+Pope+Damien+Robert+Benjamin+Wesolowski+SQIsign2D%E2%80%93West+2025" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Andrea+Basso+Pierrick+Dartois+Luca+De+Feo+Antonin+Leroux+Luciano+Maino+Giacomo+Pope+Damien+Robert+Benjamin+Wesolowski&amp;title=SQIsign2D%E2%80%93West&amp;submittedafter=2024&amp;submittedbefore=2026" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BDK<sup>+</sup>22]</div> <div><div id="ref-EC:BDKLP22" class="bibitem">Ward Beullens, Samuel Dobson, Shuichi Katsumata, Yi-Fu Lai, and Federico Pintore. Group Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient. In Orr Dunkelman and Stefan Dziembowski, editors, <em>EUROCRYPT 2022, Part II</em>, volume 13276 of <em>LNCS</em>, pages 95–126. 2022. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-031-07085-3_4">10.1007/978-3-031-07085-3_4</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Ward+Beullens+Samuel+Dobson+Shuichi+Katsumata+Yi-Fu+Lai+Federico+Pintore+Group+Signatures+and+More+from+Isogenies+and+Lattices%3A+Generic%2C+Simple%2C+and+Efficient+2022" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Ward+Beullens+Samuel+Dobson+Shuichi+Katsumata+Yi-Fu+Lai+Federico+Pintore&amp;title=Group+Signatures+and+More+from+Isogenies+and+Lattices%3A+Generic%2C+Simple%2C+and+Efficient&amp;submittedafter=2021&amp;submittedbefore=2023" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BFG<sup>+</sup>22]</div> <div><div id="ref-PKC:BFGJS22" class="bibitem">Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, and Douglas Stebila. Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake. In Goichiro Hanaoka, Junji Shikata, and Yohei Watanabe, editors, <em>PKC 2022, Part II</em>, volume 13178 of <em>LNCS</em>, pages 3–34. March 2022. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-030-97131-1_1">10.1007/978-3-030-97131-1_1</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Jacqueline+Brendel+Rune+Fiedler+Felix+G%C3%BCnther+Christian+Janson+Douglas+Stebila+Post-quantum+Asynchronous+Deniable+Key+Exchange+and+the+Signal+Handshake+2022" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Jacqueline+Brendel+Rune+Fiedler+Felix+G%C3%BCnther+Christian+Janson+Douglas+Stebila&amp;title=Post-quantum+Asynchronous+Deniable+Key+Exchange+and+the+Signal+Handshake&amp;submittedafter=2021&amp;submittedbefore=2023" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BGLS03]</div> <div><div id="ref-EC:BGLS03" class="bibitem">Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In Eli Biham, editor, <em>EUROCRYPT 2003</em>, volume 2656 of <em>LNCS</em>, pages 416–432. May 2003. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/3-540-39200-9_26">10.1007/3-540-39200-9_26</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Dan+Boneh+Craig+Gentry+Ben+Lynn+Hovav+Shacham+Aggregate+and+Verifiably+Encrypted+Signatures+from+Bilinear+Maps+2003" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Dan+Boneh+Craig+Gentry+Ben+Lynn+Hovav+Shacham&amp;title=Aggregate+and+Verifiably+Encrypted+Signatures+from+Bilinear+Maps&amp;submittedafter=2002&amp;submittedbefore=2004" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BKP20]</div> <div><div id="ref-AC:BeuKatPin20" class="bibitem">Ward Beullens, Shuichi Katsumata, and Federico Pintore. Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices. In Shiho Moriai and Huaxiong Wang, editors, <em>ASIACRYPT 2020, Part II</em>, volume 12492 of <em>LNCS</em>, pages 464–492. December 2020. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-030-64834-3_16">10.1007/978-3-030-64834-3_16</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Ward+Beullens+Shuichi+Katsumata+Federico+Pintore+Calamari+and+Falafl%3A+Logarithmic+%28Linkable%29+Ring+Signatures+from+Isogenies+and+Lattices+2020" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Ward+Beullens+Shuichi+Katsumata+Federico+Pintore&amp;title=Calamari+and+Falafl%3A+Logarithmic+%28Linkable%29+Ring+Signatures+from+Isogenies+and+Lattices&amp;submittedafter=2019&amp;submittedbefore=2021" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BKV19]</div> <div><div id="ref-AC:BeuKleVer19" class="bibitem">Ward Beullens, Thorsten Kleinjung, and Frederik Vercauteren. CSI-FiSh: Efficient Isogeny Based Signatures Through Class Group Computations. In Steven D. Galbraith and Shiho Moriai, editors, <em>ASIACRYPT 2019, Part I</em>, volume 11921 of <em>LNCS</em>, pages 227–247. December 2019. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-030-34578-5_9">10.1007/978-3-030-34578-5_9</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Ward+Beullens+Thorsten+Kleinjung+Frederik+Vercauteren+CSI-FiSh%3A+Efficient+Isogeny+Based+Signatures+Through+Class+Group+Computations+2019" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Ward+Beullens+Thorsten+Kleinjung+Frederik+Vercauteren&amp;title=CSI-FiSh%3A+Efficient+Isogeny+Based+Signatures+Through+Class+Group+Computations&amp;submittedafter=2018&amp;submittedbefore=2020" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BPS<sup>+</sup>23]</div> <div><div id="ref-cryptoeprint:2023/718" class="bibitem">Giacomo Borin, Edoardo Persichetti, Paolo Santini, Federico Pintore, and Krijn Reijnders. <a href="https://eprint.iacr.org/2023/718">A Guide to the Design of Digital Signatures based on Cryptographic Group Actions</a>. <a href="https://eprint.iacr.org/2023/718">https://eprint.iacr.org/2023/718</a>. Cryptology ePrint Archive, Paper 2023/718. 2023.</div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Giacomo+Borin+Edoardo+Persichetti+Paolo+Santini+Federico+Pintore+Krijn+Reijnders+A+Guide+to+the+Design+of+Digital+Signatures+based+on+Cryptographic+Group+Actions+2023" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Giacomo+Borin+Edoardo+Persichetti+Paolo+Santini+Federico+Pintore+Krijn+Reijnders&amp;title=A+Guide+to+the+Design+of+Digital+Signatures+based+on+Cryptographic+Group+Actions&amp;submittedafter=2022&amp;submittedbefore=2024" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[CD23]</div> <div><div id="ref-EC:CasDec23" class="bibitem">Wouter Castryck and Thomas Decru. An Efficient Key Recovery Attack on SIDH. In Carmit Hazay and Martijn Stam, editors, <em>EUROCRYPT 2023, Part V</em>, volume 14008 of <em>LNCS</em>, pages 423–447. April 2023. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-031-30589-4_15">10.1007/978-3-031-30589-4_15</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Wouter+Castryck+Thomas+Decru+An+Efficient+Key+Recovery+Attack+on+SIDH+2023" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Wouter+Castryck+Thomas+Decru&amp;title=An+Efficient+Key+Recovery+Attack+on+SIDH&amp;submittedafter=2022&amp;submittedbefore=2024" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[CDS94]</div> <div><div id="ref-C:CraDamSch94" class="bibitem">Ronald Cramer, Ivan Damgård, and Berry Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In Yvo Desmedt, editor, <em>CRYPTO'94</em>, volume 839 of <em>LNCS</em>, pages 174–187. August 1994. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/3-540-48658-5_19">10.1007/3-540-48658-5_19</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Ronald+Cramer+Ivan+Damg%C3%A5rd+Berry+Schoenmakers+Proofs+of+Partial+Knowledge+and+Simplified+Design+of+Witness+Hiding+Protocols+1994" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Ronald+Cramer+Ivan+Damg%C3%A5rd+Berry+Schoenmakers&amp;title=Proofs+of+Partial+Knowledge+and+Simplified+Design+of+Witness+Hiding+Protocols&amp;submittedafter=1993&amp;submittedbefore=1995" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[CEMR24]</div> <div><div id="ref-EC:CEMR24" class="bibitem">Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, and Krijn Reijnders. AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing. In Marc Joye and Gregor Leander, editors, <em>Advances in Cryptology – EUROCRYPT 2024, Part I</em>, volume 14651 of <em>Lecture Notes in Computer Science</em>, pages 63–93, Zurich, Switzerland. May 26–30, 2024. Springer, Cham, Switzerland. DOI: <a href="https://doi.org/10.1007/978-3-031-58716-0_3">10.1007/978-3-031-58716-0_3</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Maria+Corte-Real+Santos+Jonathan+Komada+Eriksen+Michael+Meyer+Krijn+Reijnders+Apr%C3%A8sSQI%3A+Extra+Fast+Verification+for+SQIsign+Using+Extension-Field+Signing+2024" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Maria+Corte-Real+Santos+Jonathan+Komada+Eriksen+Michael+Meyer+Krijn+Reijnders&amp;title=Apr%C3%A8sSQI%3A+Extra+Fast+Verification+for+SQIsign+Using+Extension-Field+Signing&amp;submittedafter=2023&amp;submittedbefore=2025" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[CLL23]</div> <div><div id="ref-ACNS:ConLaiLev23" class="bibitem">Kelong Cong, Yi-Fu Lai, and Shai Levin. Efficient Isogeny Proofs Using Generic Techniques. In Mehdi Tibouchi and Xiaofeng Wang, editors, <em>ACNS 23, Part II</em>, volume 13906 of <em>LNCS</em>, pages 248–275. June 2023. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-031-33491-7_10">10.1007/978-3-031-33491-7_10</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Kelong+Cong+Yi-Fu+Lai+Shai+Levin+Efficient+Isogeny+Proofs+Using+Generic+Techniques+2023" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Kelong+Cong+Yi-Fu+Lai+Shai+Levin&amp;title=Efficient+Isogeny+Proofs+Using+Generic+Techniques&amp;submittedafter=2022&amp;submittedbefore=2024" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[CLM<sup>+</sup>18]</div> <div><div id="ref-AC:CLMPR18" class="bibitem">Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes. CSIDH: An Efficient Post-Quantum Commutative Group Action. In Thomas Peyrin and Steven Galbraith, editors, <em>ASIACRYPT 2018, Part III</em>, volume 11274 of <em>LNCS</em>, pages 395–427. December 2018. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-030-03332-3_15">10.1007/978-3-030-03332-3_15</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Wouter+Castryck+Tanja+Lange+Chloe+Martindale+Lorenz+Panny+Joost+Renes+CSIDH%3A+An+Efficient+Post-Quantum+Commutative+Group+Action+2018" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Wouter+Castryck+Tanja+Lange+Chloe+Martindale+Lorenz+Panny+Joost+Renes&amp;title=CSIDH%3A+An+Efficient+Post-Quantum+Commutative+Group+Action&amp;submittedafter=2017&amp;submittedbefore=2019" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[CLP24]</div> <div><div id="ref-PKC:CheLerPan24" class="bibitem">Mingjie Chen, Antonin Leroux, and Lorenz Panny. SCALLOP-HD: Group Action from 2-Dimensional Isogenies. In Qiang Tang and Vanessa Teague, editors, <em>PKC 2024, Part II</em>, volume 14603 of <em>LNCS</em>, pages 190–216. April 2024. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-031-57725-3_7">10.1007/978-3-031-57725-3_7</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Mingjie+Chen+Antonin+Leroux+Lorenz+Panny+SCALLOP-HD%3A+Group+Action+from+2-Dimensional+Isogenies+2024" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Mingjie+Chen+Antonin+Leroux+Lorenz+Panny&amp;title=SCALLOP-HD%3A+Group+Action+from+2-Dimensional+Isogenies&amp;submittedafter=2023&amp;submittedbefore=2025" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[CSCRSDF<sup>+</sup>23]</div> <div><div id="ref-sqisign-spcifications" class="bibitem">Jorge Chavez-Saab, Maria Corte-Real Santos, Luca De Feo, Jonathan Komada Eriksen, Basil Hess, David Kohel, Antonin Leroux, Patrick Longa, Michael Meyer, Lorenz Panny, Sikhar Patranabis, Christophe Petit, Francisco Rodríguez Henríquez, Sina Schaeffler, and Benjamin Wesolowski. SQISign Specification. Accessed: 2023-10-04. <a href="https://sqisign.org/spec/sqisign-20230601.pdf">https://sqisign.org/spec/sqisign-20230601.pdf</a>. 2023.</div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Jorge+Chavez-Saab+Maria+Corte-Real+Santos+Luca+De+Feo+Jonathan+Komada+Eriksen+Basil+Hess+David+Kohel+Antonin+Leroux+Patrick+Longa+Michael+Meyer+Lorenz+Panny+Sikhar+Patranabis+Christophe+Petit+Francisco+Rodr%C3%ADguez+Henr%C3%ADquez+Sina+Schaeffler+Benjamin+Wesolowski+SQISign+Specification+2023" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Jorge+Chavez-Saab+Maria+Corte-Real+Santos+Luca+De+Feo+Jonathan+Komada+Eriksen+Basil+Hess+David+Kohel+Antonin+Leroux+Patrick+Longa+Michael+Meyer+Lorenz+Panny+Sikhar+Patranabis+Christophe+Petit+Francisco+Rodr%C3%ADguez+Henr%C3%ADquez+Sina+Schaeffler+Benjamin+Wesolowski&amp;title=SQISign+Specification&amp;submittedafter=2022&amp;submittedbefore=2024" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[DDGZ22]</div> <div><div id="ref-AC:DDGZ22" class="bibitem">Luca De Feo, Samuel Dobson, Steven D. Galbraith, and Lukas Zobernig. SIDH Proof of Knowledge. In Shweta Agrawal and Dongdai Lin, editors, <em>ASIACRYPT 2022, Part II</em>, volume 13792 of <em>LNCS</em>, pages 310–339. December 2022. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-031-22966-4_11">10.1007/978-3-031-22966-4_11</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Luca+De+Feo+Samuel+Dobson+Steven+D.+Galbraith+Lukas+Zobernig+SIDH+Proof+of+Knowledge+2022" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Luca+De+Feo+Samuel+Dobson+Steven+D.+Galbraith+Lukas+Zobernig&amp;title=SIDH+Proof+of+Knowledge&amp;submittedafter=2021&amp;submittedbefore=2023" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[DF25]</div> <div><div id="ref-sqiprime" class="bibitem">Max Duparc and Tako Boris Fouotsa. SQIPrime: A Dimension 2 Variant of SQISignHD with Non-smooth Challenge Isogenies. In Kai-Min Chung and Yu Sasaki, editors, <em>Advances in Cryptology – ASIACRYPT 2024</em>, pages 396–429, Singapore. 2025. Springer Nature Singapore. DOI: <a href="https://doi.org/10.1007/978-981-96-0891-1_13">10.1007/978-981-96-0891-1_13</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Max+Duparc+Tako+Boris+Fouotsa+SQIPrime%3A+A+Dimension+2+Variant+of+SQISignHD+with+Non-smooth+Challenge+Isogenies+2025" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Max+Duparc+Tako+Boris+Fouotsa&amp;title=SQIPrime%3A+A+Dimension+2+Variant+of+SQISignHD+with+Non-smooth+Challenge+Isogenies&amp;submittedafter=2024&amp;submittedbefore=2026" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[DFK<sup>+</sup>23]</div> <div><div id="ref-PKC:DFKLMPW23" class="bibitem">Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, and Benjamin Wesolowski. SCALLOP: Scaling the CSI-FiSh. In Alexandra Boldyreva and Vladimir Kolesnikov, editors, <em>PKC 2023, Part I</em>, volume 13940 of <em>LNCS</em>, pages 345–375. May 2023. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-031-31368-4_13">10.1007/978-3-031-31368-4_13</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Luca+De+Feo+Tako+Boris+Fouotsa+P%C3%A9ter+Kutas+Antonin+Leroux+Simon-Philipp+Merz+Lorenz+Panny+Benjamin+Wesolowski+SCALLOP%3A+Scaling+the+CSI-FiSh+2023" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Luca+De+Feo+Tako+Boris+Fouotsa+P%C3%A9ter+Kutas+Antonin+Leroux+Simon-Philipp+Merz+Lorenz+Panny+Benjamin+Wesolowski&amp;title=SCALLOP%3A+Scaling+the+CSI-FiSh&amp;submittedafter=2022&amp;submittedbefore=2024" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[DKL<sup>+</sup>20]</div> <div><div id="ref-AC:DKLPW20" class="bibitem">Luca De Feo, David Kohel, Antonin Leroux, Christophe Petit, and Benjamin Wesolowski. SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies. In Shiho Moriai and Huaxiong Wang, editors, <em>ASIACRYPT 2020, Part I</em>, volume 12491 of <em>LNCS</em>, pages 64–93. December 2020. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-030-64837-4_3">10.1007/978-3-030-64837-4_3</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Luca+De+Feo+David+Kohel+Antonin+Leroux+Christophe+Petit+Benjamin+Wesolowski+SQISign%3A+Compact+Post-quantum+Signatures+from+Quaternions+and+Isogenies+2020" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Luca+De+Feo+David+Kohel+Antonin+Leroux+Christophe+Petit+Benjamin+Wesolowski&amp;title=SQISign%3A+Compact+Post-quantum+Signatures+from+Quaternions+and+Isogenies&amp;submittedafter=2019&amp;submittedbefore=2021" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[DLLW23]</div> <div><div id="ref-EC:DLLW23" class="bibitem">Luca De Feo, Antonin Leroux, Patrick Longa, and Benjamin Wesolowski. New Algorithms for the Deuring Correspondence - Towards Practical and Secure SQISign Signatures. In Carmit Hazay and Martijn Stam, editors, <em>EUROCRYPT 2023, Part V</em>, volume 14008 of <em>LNCS</em>, pages 659–690. April 2023. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-031-30589-4_23">10.1007/978-3-031-30589-4_23</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Luca+De+Feo+Antonin+Leroux+Patrick+Longa+Benjamin+Wesolowski+New+Algorithms+for+the+Deuring+Correspondence+-+Towards+Practical+and+Secure+SQISign+Signatures+2023" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Luca+De+Feo+Antonin+Leroux+Patrick+Longa+Benjamin+Wesolowski&amp;title=New+Algorithms+for+the+Deuring+Correspondence+-+Towards+Practical+and+Secure+SQISign+Signatures&amp;submittedafter=2022&amp;submittedbefore=2024" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[DLRW24]</div> <div><div id="ref-EC:DLRW24" class="bibitem">Pierrick Dartois, Antonin Leroux, Damien Robert, and Benjamin Wesolowski. SQIsignHD: New Dimensions in Cryptography. In Marc Joye and Gregor Leander, editors, <em>EUROCRYPT 2024, Part I</em>, volume 14651 of <em>LNCS</em>, pages 3–32. May 2024. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-031-58716-0_1">10.1007/978-3-031-58716-0_1</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Pierrick+Dartois+Antonin+Leroux+Damien+Robert+Benjamin+Wesolowski+SQIsignHD%3A+New+Dimensions+in+Cryptography+2024" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Pierrick+Dartois+Antonin+Leroux+Damien+Robert+Benjamin+Wesolowski&amp;title=SQIsignHD%3A+New+Dimensions+in+Cryptography&amp;submittedafter=2023&amp;submittedbefore=2025" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[DM20]</div> <div><div id="ref-PKC:DeFMey20" class="bibitem">Luca De Feo and Michael Meyer. Threshold Schemes from Isogeny Assumptions. In Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, and Vassilis Zikas, editors, <em>PKC 2020, Part II</em>, volume 12111 of <em>LNCS</em>, pages 187–212. May 2020. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-030-45388-6_7">10.1007/978-3-030-45388-6_7</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Luca+De+Feo+Michael+Meyer+Threshold+Schemes+from+Isogeny+Assumptions+2020" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Luca+De+Feo+Michael+Meyer&amp;title=Threshold+Schemes+from+Isogeny+Assumptions&amp;submittedafter=2019&amp;submittedbefore=2021" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[EHL<sup>+</sup>18]</div> <div><div id="ref-EC:EHLMP18" class="bibitem">Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter, Travis Morrison, and Christophe Petit. Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and Solutions. In Jesper Buus Nielsen and Vincent Rijmen, editors, <em>EUROCRYPT 2018, Part III</em>, volume 10822 of <em>LNCS</em>, pages 329–368. 2018. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-319-78372-7_11">10.1007/978-3-319-78372-7_11</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Kirsten+Eisentr%C3%A4ger+Sean+Hallgren+Kristin+E.+Lauter+Travis+Morrison+Christophe+Petit+Supersingular+Isogeny+Graphs+and+Endomorphism+Rings%3A+Reductions+and+Solutions+2018" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Kirsten+Eisentr%C3%A4ger+Sean+Hallgren+Kristin+E.+Lauter+Travis+Morrison+Christophe+Petit&amp;title=Supersingular+Isogeny+Graphs+and+Endomorphism+Rings%3A+Reductions+and+Solutions&amp;submittedafter=2017&amp;submittedbefore=2019" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[ESZ22]</div> <div><div id="ref-SP:EsgSteZha22" class="bibitem">Muhammed F. Esgin, Ron Steinfeld, and Raymond K. Zhao. MatRiCT${}^+$: More Efficient Post-Quantum Private Blockchain Payments. In <em>2022 IEEE Symposium on Security and Privacy</em>, pages 1281–1298. May 2022. IEEE Computer Society Press. DOI: <a href="https://doi.org/10.1109/SP46214.2022.9833655">10.1109/SP46214.2022.9833655</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Muhammed+F.+Esgin+Ron+Steinfeld+Raymond+K.+Zhao+MatRiCT%24%7B%7D%5E%2B%24%3A+More+Efficient+Post-Quantum+Private+Blockchain+Payments+2022" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Muhammed+F.+Esgin+Ron+Steinfeld+Raymond+K.+Zhao&amp;title=MatRiCT%24%7B%7D%5E%2B%24%3A+More+Efficient+Post-Quantum+Private+Blockchain+Payments&amp;submittedafter=2021&amp;submittedbefore=2023" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[FJP14]</div> <div><div id="ref-de2014towards" class="bibitem">Luca De Feo, David Jao, and Jérôme Plût. Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. <em>Journal of Mathematical Cryptology</em>, 8(3):209–247, 2014. DOI: <a href="https://doi.org/doi:10.1515/jmc-2012-0015">doi:10.1515/jmc-2012-0015</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Luca+De+Feo+David+Jao+J%C3%A9r%C3%B4me+Pl%C3%BBt+Towards+quantum-resistant+cryptosystems+from+supersingular+elliptic+curve+isogenies+2014" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Luca+De+Feo+David+Jao+J%C3%A9r%C3%B4me+Pl%C3%BBt&amp;title=Towards+quantum-resistant+cryptosystems+from+supersingular+elliptic+curve+isogenies&amp;submittedafter=2013&amp;submittedbefore=2015" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[FS87]</div> <div><div id="ref-C:FiaSha86" class="bibitem">Amos Fiat and Adi Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In Andrew M. Odlyzko, editor, <em>CRYPTO'86</em>, volume 263 of <em>LNCS</em>, pages 186–194. August 1987. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/3-540-47721-7_12">10.1007/3-540-47721-7_12</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Amos+Fiat+Adi+Shamir+How+to+Prove+Yourself%3A+Practical+Solutions+to+Identification+and+Signature+Problems+1987" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Amos+Fiat+Adi+Shamir&amp;title=How+to+Prove+Yourself%3A+Practical+Solutions+to+Identification+and+Signature+Problems&amp;submittedafter=1986&amp;submittedbefore=1988" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[GJK24]</div> <div><div id="ref-cryptoeprint:2024/890" class="bibitem">Phillip Gajland, Jonas Janneck, and Eike Kiltz. Ring Signatures for Deniable AKEM: Gandalf's Fellowship. In Leonid Reyzin and Douglas Stebila, editors, <em>Advances in Cryptology – CRYPTO 2024</em>, pages 305–338, Cham. 2024. Springer Nature Switzerland. DOI: <a href="https://doi.org/10.1007/978-3-031-68376-3_10">10.1007/978-3-031-68376-3_10</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Phillip+Gajland+Jonas+Janneck+Eike+Kiltz+Ring+Signatures+for+Deniable+AKEM%3A+Gandalf%27s+Fellowship+2024" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Phillip+Gajland+Jonas+Janneck+Eike+Kiltz&amp;title=Ring+Signatures+for+Deniable+AKEM%3A+Gandalf%27s+Fellowship&amp;submittedafter=2023&amp;submittedbefore=2025" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[GK15]</div> <div><div id="ref-EC:GroKoh15" class="bibitem">Jens Groth and Markulf Kohlweiss. One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin. In Elisabeth Oswald and Marc Fischlin, editors, <em>EUROCRYPT 2015, Part II</em>, volume 9057 of <em>LNCS</em>, pages 253–280. April 2015. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-662-46803-6_9">10.1007/978-3-662-46803-6_9</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Jens+Groth+Markulf+Kohlweiss+One-Out-of-Many+Proofs%3A+Or+How+to+Leak+a+Secret+and+Spend+a+Coin+2015" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Jens+Groth+Markulf+Kohlweiss&amp;title=One-Out-of-Many+Proofs%3A+Or+How+to+Leak+a+Secret+and+Spend+a+Coin&amp;submittedafter=2014&amp;submittedbefore=2016" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[GPS17]</div> <div><div id="ref-AC:GalPetSil17" class="bibitem">Steven D. Galbraith, Christophe Petit, and Javier Silva. Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems. In Tsuyoshi Takagi and Thomas Peyrin, editors, <em>ASIACRYPT 2017, Part I</em>, volume 10624 of <em>LNCS</em>, pages 3–33. December 2017. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-319-70694-8_1">10.1007/978-3-319-70694-8_1</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Steven+D.+Galbraith+Christophe+Petit+Javier+Silva+Identification+Protocols+and+Signature+Schemes+Based+on+Supersingular+Isogeny+Problems+2017" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Steven+D.+Galbraith+Christophe+Petit+Javier+Silva&amp;title=Identification+Protocols+and+Signature+Schemes+Based+on+Supersingular+Isogeny+Problems&amp;submittedafter=2016&amp;submittedbefore=2018" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[HKKP21]</div> <div><div id="ref-PKC:HKKP21" class="bibitem">Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, and Thomas Prest. An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable. In Juan Garay, editor, <em>PKC 2021, Part II</em>, volume 12711 of <em>LNCS</em>, pages 410–440. May 2021. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-030-75248-4_15">10.1007/978-3-030-75248-4_15</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Keitaro+Hashimoto+Shuichi+Katsumata+Kris+Kwiatkowski+Thomas+Prest+An+Efficient+and+Generic+Construction+for+Signal%27s+Handshake+%28X3DH%29%3A+Post-Quantum%2C+State+Leakage+Secure%2C+and+Deniable+2021" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Keitaro+Hashimoto+Shuichi+Katsumata+Kris+Kwiatkowski+Thomas+Prest&amp;title=An+Efficient+and+Generic+Construction+for+Signal%27s+Handshake+%28X3DH%29%3A+Post-Quantum%2C+State+Leakage+Secure%2C+and+Deniable&amp;submittedafter=2020&amp;submittedbefore=2022" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[KKW18]</div> <div><div id="ref-CCS:KatKolWan18" class="bibitem">Jonathan Katz, Vladimir Kolesnikov, and Xiao Wang. Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures. In David Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang, editors, <em>ACM CCS 2018</em>, pages 525–537. October 2018. ACM Press. DOI: <a href="https://doi.org/10.1145/3243734.3243805">10.1145/3243734.3243805</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Jonathan+Katz+Vladimir+Kolesnikov+Xiao+Wang+Improved+Non-Interactive+Zero+Knowledge+with+Applications+to+Post-Quantum+Signatures+2018" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Jonathan+Katz+Vladimir+Kolesnikov+Xiao+Wang&amp;title=Improved+Non-Interactive+Zero+Knowledge+with+Applications+to+Post-Quantum+Signatures&amp;submittedafter=2017&amp;submittedbefore=2019" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[KLLQ23]</div> <div><div id="ref-C:KLLQ23" class="bibitem">Shuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, and Ling Qin. CSI-Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist. In Helena Handschuh and Anna Lysyanskaya, editors, <em>CRYPTO 2023, Part III</em>, volume 14083 of <em>LNCS</em>, pages 729–761. August 2023. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-031-38548-3_24">10.1007/978-3-031-38548-3_24</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Shuichi+Katsumata+Yi-Fu+Lai+Jason+T.+LeGrow+Ling+Qin+CSI-Otter%3A+Isogeny-Based+%28Partially%29+Blind+Signatures+from+the+Class+Group+Action+with+a+Twist+2023" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Shuichi+Katsumata+Yi-Fu+Lai+Jason+T.+LeGrow+Ling+Qin&amp;title=CSI-Otter%3A+Isogeny-Based+%28Partially%29+Blind+Signatures+from+the+Class+Group+Action+with+a+Twist&amp;submittedafter=2022&amp;submittedbefore=2024" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[KLPT14]</div> <div><div id="ref-klpt" class="bibitem">David Kohel, Kristin Lauter, Christophe Petit, and Jean-Pierre Tignol. On the quaternion $\ell$-isogeny path problem. <em>LMS Journal of Computation and Mathematics</em>, 17(A):418–432, 2014. DOI: <a href="https://doi.org/10.1112/S1461157014000151">10.1112/S1461157014000151</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=David+Kohel+Kristin+Lauter+Christophe+Petit+Jean-Pierre+Tignol+On+the+quaternion+%24%5Cell%24-isogeny+path+problem+2014" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=David+Kohel+Kristin+Lauter+Christophe+Petit+Jean-Pierre+Tignol&amp;title=On+the+quaternion+%24%5Cell%24-isogeny+path+problem&amp;submittedafter=2013&amp;submittedbefore=2015" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Kup05]</div> <div><div id="ref-kuperberg2005subexponential" class="bibitem">Greg Kuperberg. A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem. <em>SIAM Journal on Computing</em>, 35(1):170-188, 2005. DOI: <a href="https://doi.org/10.1137/S0097539703436345">10.1137/S0097539703436345</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Greg+Kuperberg+A+Subexponential-Time+Quantum+Algorithm+for+the+Dihedral+Hidden+Subgroup+Problem+2005" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Greg+Kuperberg&amp;title=A+Subexponential-Time+Quantum+Algorithm+for+the+Dihedral+Hidden+Subgroup+Problem&amp;submittedafter=2004&amp;submittedbefore=2006" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Kup13]</div> <div><div id="ref-kuperberg11" class="bibitem">Greg Kuperberg. Another Subexponential-time Quantum Algorithm for the Dihedral Hidden Subgroup Problem. In Simone Severini and Fernando Brandao, editors, <em>8th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2013)</em>, volume 22 of <em>Leibniz International Proceedings in Informatics (LIPIcs)</em>, pages 20–34, Dagstuhl, Germany. 2013. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. DOI: <a href="https://doi.org/10.4230/LIPIcs.TQC.2013.20">10.4230/LIPIcs.TQC.2013.20</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Greg+Kuperberg+Another+Subexponential-time+Quantum+Algorithm+for+the+Dihedral+Hidden+Subgroup+Problem+2013" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Greg+Kuperberg&amp;title=Another+Subexponential-time+Quantum+Algorithm+for+the+Dihedral+Hidden+Subgroup+Problem&amp;submittedafter=2012&amp;submittedbefore=2014" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Lai24]</div> <div><div id="ref-CiC-1-3-1" class="bibitem">Yi-Fu Lai. Capybara and Tsubaki: Verifiable Random Functions from Group Actions and Isogenies. <em>IACR Communications in Cryptology</em>, 1(3), 2024. DOI: <a href="https://doi.org/10.62056/avr-11zn4">10.62056/avr-11zn4</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Yi-Fu+Lai+Capybara+and+Tsubaki%3A+Verifiable+Random+Functions+from+Group+Actions+and+Isogenies+2024" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Yi-Fu+Lai&amp;title=Capybara+and+Tsubaki%3A+Verifiable+Random+Functions+from+Group+Actions+and+Isogenies&amp;submittedafter=2023&amp;submittedbefore=2025" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[LAZ19]</div> <div><div id="ref-ACNS:LuAuZha19" class="bibitem">Xingye Lu, Man Ho Au, and Zhenfei Zhang. Raptor: A Practical Lattice-Based (Linkable) Ring Signature. In Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, and Moti Yung, editors, <em>ACNS 19</em>, volume 11464 of <em>LNCS</em>, pages 110–130. June 2019. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-030-21568-2_6">10.1007/978-3-030-21568-2_6</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Xingye+Lu+Man+Ho+Au+Zhenfei+Zhang+Raptor%3A+A+Practical+Lattice-Based+%28Linkable%29+Ring+Signature+2019" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Xingye+Lu+Man+Ho+Au+Zhenfei+Zhang&amp;title=Raptor%3A+A+Practical+Lattice-Based+%28Linkable%29+Ring+Signature&amp;submittedafter=2018&amp;submittedbefore=2020" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Ler22]</div> <div><div id="ref-leroux2022quaternion" class="bibitem">Antonin Leroux. <em>Quaternion Algebra and isogeny-based cryptography</em>. PhD thesis, PhD thesis, Ecole doctorale de l’Institut Polytechnique de Paris, 2022.</div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Antonin+Leroux+Quaternion+Algebra+and+isogeny-based+cryptography+2022" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Antonin+Leroux&amp;title=Quaternion+Algebra+and+isogeny-based+cryptography&amp;submittedafter=2021&amp;submittedbefore=2023" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Ler23]</div> <div><div id="ref-cryptoeprint:2023/1251" class="bibitem">Antonin Leroux. <a href="https://eprint.iacr.org/2023/1251">Verifiable random function from the Deuring correspondence and higher dimensional isogenies</a>. Cryptology ePrint Archive, Paper 2023/1251. 2023.</div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Antonin+Leroux+Verifiable+random+function+from+the+Deuring+correspondence+and+higher+dimensional+isogenies+2023" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Antonin+Leroux&amp;title=Verifiable+random+function+from+the+Deuring+correspondence+and+higher+dimensional+isogenies&amp;submittedafter=2022&amp;submittedbefore=2024" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[LGD21]</div> <div><div id="ref-EC:LaiGalDel21" class="bibitem">Yi-Fu Lai, Steven D. Galbraith, and Cyprien Delpech de Saint Guilhem. Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer. In Anne Canteaut and François-Xavier Standaert, editors, <em>EUROCRYPT 2021, Part I</em>, volume 12696 of <em>LNCS</em>, pages 213–241. October 2021. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-030-77870-5_8">10.1007/978-3-030-77870-5_8</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Yi-Fu+Lai+Steven+D.+Galbraith+Cyprien+Delpech+de+Saint+Guilhem+Compact%2C+Efficient+and+UC-Secure+Isogeny-Based+Oblivious+Transfer+2021" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Yi-Fu+Lai+Steven+D.+Galbraith+Cyprien+Delpech+de+Saint+Guilhem&amp;title=Compact%2C+Efficient+and+UC-Secure+Isogeny-Based+Oblivious+Transfer&amp;submittedafter=2020&amp;submittedbefore=2022" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[LNS21]</div> <div><div id="ref-C:LyuNguSei21" class="bibitem">Vadim Lyubashevsky, Ngoc Khanh Nguyen, and Gregor Seiler. SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions. In Tal Malkin and Chris Peikert, editors, <em>CRYPTO 2021, Part II</em>, volume 12826 of <em>LNCS</em>, pages 611–640, Virtual Event. August 2021. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-030-84245-1_21">10.1007/978-3-030-84245-1_21</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Vadim+Lyubashevsky+Ngoc+Khanh+Nguyen+Gregor+Seiler+SMILE%3A+Set+Membership+from+Ideal+Lattices+with+Applications+to+Ring+Signatures+and+Confidential+Transactions+2021" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Vadim+Lyubashevsky+Ngoc+Khanh+Nguyen+Gregor+Seiler&amp;title=SMILE%3A+Set+Membership+from+Ideal+Lattices+with+Applications+to+Ring+Signatures+and+Confidential+Transactions&amp;submittedafter=2020&amp;submittedbefore=2022" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[LWW04]</div> <div><div id="ref-ACISP:LiuWeiWon04" class="bibitem">Joseph K. Liu, Victor K. Wei, and Duncan S. Wong. Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). In Huaxiong Wang, Josef Pieprzyk, and Vijay Varadharajan, editors, <em>ACISP 04</em>, volume 3108 of <em>LNCS</em>, pages 325–335. July 2004. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-540-27800-9_28">10.1007/978-3-540-27800-9_28</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Joseph+K.+Liu+Victor+K.+Wei+Duncan+S.+Wong+Linkable+Spontaneous+Anonymous+Group+Signature+for+Ad+Hoc+Groups+%28Extended+Abstract%29+2004" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Joseph+K.+Liu+Victor+K.+Wei+Duncan+S.+Wong&amp;title=Linkable+Spontaneous+Anonymous+Group+Signature+for+Ad+Hoc+Groups+%28Extended+Abstract%29&amp;submittedafter=2003&amp;submittedbefore=2005" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Mer88]</div> <div><div id="ref-C:Merkle87" class="bibitem">Ralph C. Merkle. A Digital Signature Based on a Conventional Encryption Function. In Carl Pomerance, editor, <em>CRYPTO'87</em>, volume 293 of <em>LNCS</em>, pages 369–378. August 1988. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/3-540-48184-2_32">10.1007/3-540-48184-2_32</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Ralph+C.+Merkle+A+Digital+Signature+Based+on+a+Conventional+Encryption+Function+1988" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Ralph+C.+Merkle&amp;title=A+Digital+Signature+Based+on+a+Conventional+Encryption+Function&amp;submittedafter=1987&amp;submittedbefore=1989" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[MMP<sup>+</sup>23]</div> <div><div id="ref-EC:MMPPW23" class="bibitem">Luciano Maino, Chloe Martindale, Lorenz Panny, Giacomo Pope, and Benjamin Wesolowski. A Direct Key Recovery Attack on SIDH. In Carmit Hazay and Martijn Stam, editors, <em>EUROCRYPT 2023, Part V</em>, volume 14008 of <em>LNCS</em>, pages 448–471. April 2023. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-031-30589-4_16">10.1007/978-3-031-30589-4_16</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Luciano+Maino+Chloe+Martindale+Lorenz+Panny+Giacomo+Pope+Benjamin+Wesolowski+A+Direct+Key+Recovery+Attack+on+SIDH+2023" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Luciano+Maino+Chloe+Martindale+Lorenz+Panny+Giacomo+Pope+Benjamin+Wesolowski&amp;title=A+Direct+Key+Recovery+Attack+on+SIDH&amp;submittedafter=2022&amp;submittedbefore=2024" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[NOC<sup>+</sup>25]</div> <div><div id="ref-sqisign2de" class="bibitem">Kohei Nakagawa, Hiroshi Onuki, Wouter Castryck, Mingjie Chen, Riccardo Invernizzi, Gioella Lorenzon, and Frederik Vercauteren. SQIsign2D-East: A New Signature Scheme Using 2-Dimensional Isogenies. In Kai-Min Chung and Yu Sasaki, editors, <em>Advances in Cryptology – ASIACRYPT 2024</em>, pages 272–303, Singapore. 2025. Springer Nature Singapore. DOI: <a href="https://doi.org/10.1007/978-981-96-0891-1_9">10.1007/978-981-96-0891-1_9</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Kohei+Nakagawa+Hiroshi+Onuki+Wouter+Castryck+Mingjie+Chen+Riccardo+Invernizzi+Gioella+Lorenzon+Frederik+Vercauteren+SQIsign2D-East%3A+A+New+Signature+Scheme+Using+2-Dimensional+Isogenies+2025" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Kohei+Nakagawa+Hiroshi+Onuki+Wouter+Castryck+Mingjie+Chen+Riccardo+Invernizzi+Gioella+Lorenzon+Frederik+Vercauteren&amp;title=SQIsign2D-East%3A+A+New+Signature+Scheme+Using+2-Dimensional+Isogenies&amp;submittedafter=2024&amp;submittedbefore=2026" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Noe15]</div> <div><div id="ref-EPRINT:Noether15" class="bibitem">Shen Noether. Ring Signature Confidential Transactions for Monero. <a href="https://eprint.iacr.org/2015/1098">https://eprint.iacr.org/2015/1098</a>. Cryptology ePrint Archive, Report 2015/1098. 2015.</div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Shen+Noether+Ring+Signature+Confidential+Transactions+for+Monero+2015" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Shen+Noether&amp;title=Ring+Signature+Confidential+Transactions+for+Monero&amp;submittedafter=2014&amp;submittedbefore=2016" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[NS04]</div> <div><div id="ref-nguyen2009lowdimlattices" class="bibitem">Phong Q. Nguyen and Damien Stehlé. Low-Dimensional Lattice Basis Reduction Revisited. In Duncan Buell, editor, <em>Algorithmic Number Theory</em>, pages 338–357, Berlin, Heidelberg. 2004. Springer Berlin Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-540-24847-7_26">10.1007/978-3-540-24847-7_26</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Phong+Q.+Nguyen+Damien+Stehl%C3%A9+Low-Dimensional+Lattice+Basis+Reduction+Revisited+2004" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Phong+Q.+Nguyen+Damien+Stehl%C3%A9&amp;title=Low-Dimensional+Lattice+Basis+Reduction+Revisited&amp;submittedafter=2003&amp;submittedbefore=2005" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[ON25]</div> <div><div id="ref-onuki2024ideal" class="bibitem">Hiroshi Onuki and Kohei Nakagawa. Ideal-to-Isogeny Algorithm Using 2-Dimensional Isogenies and Its Application to SQIsign. In Kai-Min Chung and Yu Sasaki, editors, <em>Advances in Cryptology – ASIACRYPT 2024</em>, pages 243–271, Singapore. 2025. Springer Nature Singapore. DOI: <a href="https://doi.org/doi.org/10.1007/978-981-96-0891-1_8">doi.org/10.1007/978-981-96-0891-1_8</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Hiroshi+Onuki+Kohei+Nakagawa+Ideal-to-Isogeny+Algorithm+Using+2-Dimensional+Isogenies+and+Its+Application+to+SQIsign+2025" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Hiroshi+Onuki+Kohei+Nakagawa&amp;title=Ideal-to-Isogeny+Algorithm+Using+2-Dimensional+Isogenies+and+Its+Application+to+SQIsign&amp;submittedafter=2024&amp;submittedbefore=2026" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Pei20]</div> <div><div id="ref-EC:Peikert20" class="bibitem">Chris Peikert. He Gives C-Sieves on the CSIDH. In Anne Canteaut and Yuval Ishai, editors, <em>EUROCRYPT 2020, Part II</em>, volume 12106 of <em>LNCS</em>, pages 463–492. May 2020. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-030-45724-2_16">10.1007/978-3-030-45724-2_16</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Chris+Peikert+He+Gives+C-Sieves+on+the+CSIDH+2020" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Chris+Peikert&amp;title=He+Gives+C-Sieves+on+the+CSIDH&amp;submittedafter=2019&amp;submittedbefore=2021" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[PW24]</div> <div><div id="ref-EC:PagWes24" class="bibitem">Aurel Page and Benjamin Wesolowski. The Supersingular Endomorphism Ring and One Endomorphism Problems are Equivalent. In Marc Joye and Gregor Leander, editors, <em>EUROCRYPT 2024, Part VI</em>, volume 14656 of <em>LNCS</em>, pages 388–417. May 2024. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-031-58751-1_14">10.1007/978-3-031-58751-1_14</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Aurel+Page+Benjamin+Wesolowski+The+Supersingular+Endomorphism+Ring+and+One+Endomorphism+Problems+are+Equivalent+2024" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Aurel+Page+Benjamin+Wesolowski&amp;title=The+Supersingular+Endomorphism+Ring+and+One+Endomorphism+Problems+are+Equivalent&amp;submittedafter=2023&amp;submittedbefore=2025" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[RK24]</div> <div><div id="ref-sqiasignhd" class="bibitem">Farzin Renan and Péter Kutas. <a href="https://eprint.iacr.org/2024/561">SQIAsignHD: SQIsignHD Adaptor Signature</a>. <a href="https://eprint.iacr.org/2024/561">https://eprint.iacr.org/2024/561</a>. Cryptology ePrint Archive, Paper 2024/561. 2024.</div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Farzin+Renan+P%C3%A9ter+Kutas+SQIAsignHD%3A+SQIsignHD+Adaptor+Signature+2024" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Farzin+Renan+P%C3%A9ter+Kutas&amp;title=SQIAsignHD%3A+SQIsignHD+Adaptor+Signature&amp;submittedafter=2023&amp;submittedbefore=2025" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Rob23]</div> <div><div id="ref-EC:Robert23" class="bibitem">Damien Robert. Breaking SIDH in Polynomial Time. In Carmit Hazay and Martijn Stam, editors, <em>EUROCRYPT 2023, Part V</em>, volume 14008 of <em>LNCS</em>, pages 472–503. April 2023. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-031-30589-4_17">10.1007/978-3-031-30589-4_17</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Damien+Robert+Breaking+SIDH+in+Polynomial+Time+2023" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Damien+Robert&amp;title=Breaking+SIDH+in+Polynomial+Time&amp;submittedafter=2022&amp;submittedbefore=2024" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[RST01]</div> <div><div id="ref-AC:RivShaTau01" class="bibitem">Ronald L. Rivest, Adi Shamir, and Yael Tauman. How to Leak a Secret. In Colin Boyd, editor, <em>ASIACRYPT 2001</em>, volume 2248 of <em>LNCS</em>, pages 552–565. December 2001. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/3-540-45682-1_32">10.1007/3-540-45682-1_32</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Ronald+L.+Rivest+Adi+Shamir+Yael+Tauman+How+to+Leak+a+Secret+2001" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Ronald+L.+Rivest+Adi+Shamir+Yael+Tauman&amp;title=How+to+Leak+a+Secret&amp;submittedafter=2000&amp;submittedbefore=2002" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Sho94]</div> <div><div id="ref-shor" class="bibitem">P.W. Shor. Algorithms for quantum computation: discrete logarithms and factoring. In <em>Proceedings 35th Annual Symposium on Foundations of Computer Science</em>, pages 124-134. 1994. DOI: <a href="https://doi.org/10.1109/SFCS.1994.365700">10.1109/SFCS.1994.365700</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=P.W.+Shor+Algorithms+for+quantum+computation%3A+discrete+logarithms+and+factoring+1994" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=P.W.+Shor&amp;title=Algorithms+for+quantum+computation%3A+discrete+logarithms+and+factoring&amp;submittedafter=1993&amp;submittedbefore=1995" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Sil09]</div> <div><div id="ref-book:silverman2009arithmetic" class="bibitem">Joseph H. Silverman. <em>The Arithmetic of Elliptic Curves</em>, volume 106 of <em>Graduate Texts in Mathematics</em>. Graduate Texts in Mathematics. Springer New York, NY, 2 edition. 2009. DOI: <a href="https://doi.org/10.1007/978-0-387-09494-6">10.1007/978-0-387-09494-6</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Joseph+H.+Silverman+The+Arithmetic+of+Elliptic+Curves+2009" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Joseph+H.+Silverman&amp;title=The+Arithmetic+of+Elliptic+Curves&amp;submittedafter=2008&amp;submittedbefore=2010" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[UJ20]</div> <div><div id="ref-urbanik2020new" class="bibitem">David Urbanik and David Jao. New Techniques for SIDH-based NIKE. <em>Journal of Mathematical Cryptology</em>, 14(1):120–128, 2020. DOI: <a href="https://doi.org/doi:10.1515/jmc-2015-0056">doi:10.1515/jmc-2015-0056</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=David+Urbanik+David+Jao+New+Techniques+for+SIDH-based+NIKE+2020" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=David+Urbanik+David+Jao&amp;title=New+Techniques+for+SIDH-based+NIKE&amp;submittedafter=2019&amp;submittedbefore=2021" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[vdC35]</div> <div><div id="ref-van1935verallgemeinerung" class="bibitem">J van der Corput. Verallgemeinerung einer mordellschen Beweismethode in der Geometrie der Zahlen. <em>Acta Arithmetica</em>, 1(1):62–66, 1935.</div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=J+van+der+Corput+Verallgemeinerung+einer+mordellschen+Beweismethode+in+der+Geometrie+der+Zahlen+1935" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=J+van+der+Corput&amp;title=Verallgemeinerung+einer+mordellschen+Beweismethode+in+der+Geometrie+der+Zahlen&amp;submittedafter=1934&amp;submittedbefore=1936" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Voi21]</div> <div><div id="ref-voight2021quaternion" class="bibitem">John Voight. <em>Quaternion Algebras</em>, volume 288 of <em>Graduate Texts in Mathematics</em>. Graduate Texts in Mathematics. Springer Cham, 1 edition. 2021. DOI: <a href="https://doi.org/10.1007/978-3-030-56694-4">10.1007/978-3-030-56694-4</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=John+Voight+Quaternion+Algebras+2021" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=John+Voight&amp;title=Quaternion+Algebras&amp;submittedafter=2020&amp;submittedbefore=2022" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Wes22]</div> <div><div id="ref-FOCS:Wesolowski21" class="bibitem">Benjamin Wesolowski. The supersingular isogeny path and endomorphism ring problems are equivalent. In <em>62nd FOCS</em>, pages 1100–1111. February 2022. IEEE Computer Society Press. DOI: <a href="https://doi.org/10.1109/FOCS52979.2021.00109">10.1109/FOCS52979.2021.00109</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Benjamin+Wesolowski+The+supersingular+isogeny+path+and+endomorphism+ring+problems+are+equivalent+2022" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Benjamin+Wesolowski&amp;title=The+supersingular+isogeny+path+and+endomorphism+ring+problems+are+equivalent&amp;submittedafter=2021&amp;submittedbefore=2023" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[YAJ<sup>+</sup>17]</div> <div><div id="ref-FC:YAJJS17" class="bibitem">Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, and Vladimir Soukharev. A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies. In Aggelos Kiayias, editor, <em>FC 2017</em>, volume 10322 of <em>LNCS</em>, pages 163–181. April 2017. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-319-70972-7_9">10.1007/978-3-319-70972-7_9</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Youngho+Yoo+Reza+Azarderakhsh+Amir+Jalali+David+Jao+Vladimir+Soukharev+A+Post-quantum+Digital+Signature+Scheme+Based+on+Supersingular+Isogenies+2017" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Youngho+Yoo+Reza+Azarderakhsh+Amir+Jalali+David+Jao+Vladimir+Soukharev&amp;title=A+Post-quantum+Digital+Signature+Scheme+Based+on+Supersingular+Isogenies&amp;submittedafter=2016&amp;submittedbefore=2018" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[YEL<sup>+</sup>21]</div> <div><div id="ref-C:YELAD21" class="bibitem">Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, and Zhimin Ding. DualRing: Generic Construction of Ring Signatures with Efficient Instantiations. In Tal Malkin and Chris Peikert, editors, <em>CRYPTO 2021, Part I</em>, volume 12825 of <em>LNCS</em>, pages 251–281, Virtual Event. August 2021. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-030-84242-0_10">10.1007/978-3-030-84242-0_10</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Tsz+Hon+Yuen+Muhammed+F.+Esgin+Joseph+K.+Liu+Man+Ho+Au+Zhimin+Ding+DualRing%3A+Generic+Construction+of+Ring+Signatures+with+Efficient+Instantiations+2021" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Tsz+Hon+Yuen+Muhammed+F.+Esgin+Joseph+K.+Liu+Man+Ho+Au+Zhimin+Ding&amp;title=DualRing%3A+Generic+Construction+of+Ring+Signatures+with+Efficient+Instantiations&amp;submittedafter=2020&amp;submittedbefore=2022" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[YSL<sup>+</sup>20]</div> <div><div id="ref-FC:YSLAEZG20" class="bibitem">Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, and Dawu Gu. RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. In Joseph Bonneau and Nadia Heninger, editors, <em>FC 2020</em>, volume 12059 of <em>LNCS</em>, pages 464–483. February 2020. Springer, Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-030-51280-4_25">10.1007/978-3-030-51280-4_25</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Tsz+Hon+Yuen+Shifeng+Sun+Joseph+K.+Liu+Man+Ho+Au+Muhammed+F.+Esgin+Qingzhao+Zhang+Dawu+Gu+RingCT+3.0+for+Blockchain+Confidential+Transaction%3A+Shorter+Size+and+Stronger+Security+2020" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Tsz+Hon+Yuen+Shifeng+Sun+Joseph+K.+Liu+Man+Ho+Au+Muhammed+F.+Esgin+Qingzhao+Zhang+Dawu+Gu&amp;title=RingCT+3.0+for+Blockchain+Confidential+Transaction%3A+Shorter+Size+and+Stronger+Security&amp;submittedafter=2019&amp;submittedbefore=2021" target="_blank" class="ms-3">ePrint</a> </div> </div> <div class="col-12 col-md-4"> <p class="mt-4"> <a class="btn btn-outline-dark" href="/p/1/4/4/pdf"><img alt="PDF" class="icon" src="/images/file-pdf.svg">PDF</a> <img style="margin-left: 1rem;max-width: 1.2rem;" src="/images/open_access.svg" title="Open access" alt="Open access"> </p> <div class="my-4"> <span class="fw-bold me-2">DOI:</span> <a href="https://doi.org/10.62056/ava3zivrzn">https://doi.org/10.62056/ava3zivrzn</a> </div> <div class="card mb-4"> <h5 class="card-header">History</h5> <div class="card-body"> <strong>Submitted</strong>: 2024-07-09<br> <strong>Accepted</strong>: 2024-12-03<br> <strong>Published</strong>: 2025-01-13<br> <!-- begin crossmark --> <script src="https://crossmark-cdn.crossref.org/widget/v2.0/widget.js"></script> <a data-target="crossmark"><img style="margin-top:4px;" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" width="150" /></a> <!-- end crossmark --> </div> </div> <div class="card mb-4"> <h5 class="card-header">How to cite</h5> <div class="card-body"> <p>Giacomo Borin, Yi-Fu Lai, and Antonin Leroux, Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies. <span class="fst-italic">IACR Communications in Cryptology</span>, vol. 1, no. 4, Jan 13, 2025, doi: 10.62056/ava3zivrzn. </p> <button type="button" id="citationModalLabel" class="float-end btn btn-outline-dark" data-bs-toggle="modal" data-bs-target="#citationModal"> BibTeX, etc </button> </div> </div> <div class="card mb-4"> <h5 class="card-header">License</h5> <div class="card-body"> <p>Copyright is held by the author(s)</p> <p> This work is licensed under a <a target="_blank" href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution (CC BY)</a> license. </p> </div> </div> </div> </div> <div class="modal fade" id="citationModal" tabindex="-1" aria-labelledby="citationModalLabel" aria-hidden="true"> <div class="modal-dialog modal-xl"> <div class="modal-content"> <div class="modal-header"> <h1 class="modal-title fs-3">How to cite this</h1> <button type="button" class="btn-close" data-bs-dismiss="modal" aria-label="Close"></button> </div> <div class="modal-body p-4"> <ul class="nav nav-tabs" id="myTab" role="tablist"> <li class="nav-item" role="presentation"> <button class="nav-link active" id="bibtex-tab" data-bs-toggle="tab" data-bs-target="#bibtex-pane" type="button" role="tab" aria-controls="bibtex-pane" aria-selected="true">BibTeX</button> </li> <li class="nav-item" role="presentation"> <button class="nav-link" id="ris-tab" data-bs-toggle="tab" data-bs-target="#ris-pane" type="button" role="tab" aria-controls="ris-pane" aria-selected="false">RIS/Endnote/Zotero/Mendeley</button> </li> <li class="nav-item" role="presentation"> <button class="nav-link" id="text-tab" data-bs-toggle="tab" data-bs-target="#text-pane" type="button" role="tab" aria-controls="text-pane" aria-selected="false">Text</button> </li> </ul> <div class="tab-content p-4"> <div class="tab-pane active" id="bibtex-pane" role="tabpanel" aria-labelledby="bibtex-tab" tabindex="0"> <pre id="bib">@article{CiC-1-4-4, author = &#34;Borin, Giacomo and Lai, Yi-Fu and Leroux, Antonin&#34;, journal = &#34;{IACR} {C}ommunications in {C}ryptology&#34;, publisher = &#34;{I}nternational {A}ssociation for {C}ryptologic {R}esearch&#34;, title = &#34;Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies&#34;, volume = &#34;1&#34;, number = &#34;4&#34;, date = &#34;2025-01-13&#34;, year = &#34;2025&#34;, issn = &#34;3006-5496&#34;, doi = &#34;10.62056/ava3zivrzn&#34; } </pre> <button id="bibtexcopy" class="btn btn-sm btn-primary" aria-label="Copy to clipboard" onclick="copyMetadata('bibtexcopy', 'bib')">Copy to clipboard</button> <button id="bibtexdownload" class="ms-3 btn btn-sm btn-primary" aria-label="Download BibTeX .bib file" onclick="sendCitation('bib')">Download .bib file</button> </div> <div class="tab-pane" id="ris-pane" role="tabpanel" aria-labelledby="ris-tab" tabindex="0"> <pre id="ris">TY - JOUR AU - Borin, Giacomo AU - Lai, Yi-Fu AU - Leroux, Antonin PY - 2025 TI - Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies JF - IACR Communications in Cryptology JA - CIC VL - 1 IS - 4 DO - 10.62056/ava3zivrzn UR - https://doi.org/10.62056/ava3zivrzn AB - &lt;p&gt; We construct two efficient post-quantum ring signatures with anonymity against full key exposure from isogenies, addressing the limitations of existing isogeny-based ring signatures.&lt;/p&gt;&lt;p&gt; First, we present an efficient concrete distinguisher for the SQIsign simulator when the signing key is provided using one transcript. This shows that turning SQIsign into an efficient full anonymous ring signature requires some new ideas.&lt;/p&gt;&lt;p&gt; Second, we propose a variant of SQIsign (Asiacrypt&#39;20) that is resistant to the distinguisher attack with only a x1.4 increase in size and we render it to a ring signature, that we refer to as Erebor. This variant introduces a new zero-knowledge assumption that ensures full anonymity. The efficiency of Erebor remains comparable to that of SQIsign, with only a proportional increase due to the ring size. This results in a signature size of 0.71 KB for 4 users and 1.41 KB for 8 users, making it the most compact post-quantum ring signature for up to 29 users.&lt;/p&gt;&lt;p&gt; Third, we revisit the GPS signature scheme (Asiacrypt&#39;17), developing efficient subroutines to make the scheme more efficient and significantly reduce the resulting signature size. By integrating our scheme with the paradigm by Beullens, Katsumata, and Pintore (Asiacrypt’20), we achieve an efficient logarithmic ring signature, that we call Durian, resulting in a signature size of 9.87 KB for a ring of size 1024.&lt;/p&gt; ER -</pre> <button id="riscopy" class="btn btn-sm btn-primary" aria-label="Copy to clipboard" onclick="copyMetadata('riscopy', 'ris')">Copy to clipboard</button> <button id="risdownload" class="ms-3 btn btn-sm btn-primary" aria-label="Download RIS file" onclick="sendCitation('ris')">Download .ris file</button> </div> <div class="tab-pane" id="text-pane" role="tabpanel" aria-labelledby="text-tab" tabindex="0"> <div class="w-75" id="textcitation">Giacomo Borin, Yi-Fu Lai, and Antonin Leroux, Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies. <span class="fst-italic">IACR Communications in Cryptology</span>, vol. 1, no. 4, Jan 13, 2025, doi: 10.62056/ava3zivrzn.</div> <button id="textcopy" class="btn btn-sm btn-primary mt-3" aria-label="Copy to clipboard" onclick="copyMetadata('textcopy', 'textcitation')">Copy to clipboard</button> </div> </div> </div> <div class="modal-footer"> <button type="button" class="btn btn-secondary" data-bs-dismiss="modal">Close</button> </div> </div> </div> </div> <div class="modal fade" id="citationsModal" tabindex="-1" aria-labelledby="citationsModalLabel" aria-hidden="true"> <div class="modal-dialog modal-dialog-scrollable modal-lg"> <div class="modal-content"> <div class="modal-header"> <h1 class="modal-title fs-3">Known citations</h1> <button type="button" class="btn-close" data-bs-dismiss="modal" aria-label="Close"></button> </div> <div class="modal-body p-4"> <p> We do not crawl the web, so we are only able to identify citations from papers that are registered with a DOI in crossref.org and the publisher reports their citations to crossref, and crossref can identify a DOI from the reference. That includes (most) articles from Springer and many from ACM, but it excludes citations from USENIX because they don't issue DOIs. It also excludes citations from arxiv and eprint. You may find more citations in <a href="https://scholar.google.com/scholar?hl=en&q=Erebor+and+Durian%3A+Full+Anonymous+Ring+Signatures+from+Quaternions+and+Isogenies">Google Scholar</a>. </p> <ol> </ol> </div> <div class="modal-footer"> <button type="button" class="btn btn-secondary" data-bs-dismiss="modal">Close</button> </div> </div> </div> </div> <script> function copyMetadata(buttid, id) { let range = document.createRange(); range.selectNode(document.getElementById(id)); window.getSelection().removeAllRanges(); window.getSelection().addRange(range); document.execCommand('copy'); window.getSelection().removeAllRanges(); const copyTooltip = new bootstrap.Tooltip('#' + buttid, {trigger: 'manual', title: 'Copied!'}); copyTooltip.show(); setTimeout(function() { copyTooltip.dispose(); }, 2000); } function sendCitation(typ) { // typ is 'bib' or 'ris' let data = document.getElementById(typ).innerHTML; atag = document.createElement('a'); atag.setAttribute('href', 'data:text/plain;charset=utf-8,' + encodeURIComponent(data)); atag.setAttribute('download', '1-4-4.' + typ); if (document.createEvent) { let event = document.createEvent('MouseEvents'); event.initEvent('click', true, true); atag.dispatchEvent(event); } else { atag.click(); } } </script> </main> <div class="container-fluid mt-auto" id="pageFooter"> </div> <footer class="text-center footer py-3"> <small> <a href="https://iacr.org/copyright.html">Copyright © 2025</a> <span class="d-none d-md-inline">by the </span><span class="d-md-none">IACR</span> <span class="d-none d-md-inline">International Association for Cryptologic Research</span> <span class="d-none d-md-inline">• </span><br class="d-md-none"> <a href="https://iacr.org/privacy.html">Privacy Policy</a> </small> </footer> <script id="results-template" type="text/x-handlebars-template"> <div class="p-3 shadow" style="margin-bottom:1rem;max-height:70vh;overflow-y:scroll"> <p>{{estimated_results}} results (if more than 100, then refine your query)</p> <ol> {{#each results}} <li role="presentation"><a href="{{url}}">{{title}}</a><br> {{#each authors }}{{this}}{{#unless @last}}, {{/unless}}{{/each}}</li> {{/each}} </ol> </div> </script> <script src="/static/js/handlebars-v4.7.7.js"></script> <script> var theTemplateScript = document.getElementById('results-template').innerHTML; var resultsTemplate = Handlebars.compile(theTemplateScript); var textinput = document.getElementById('searchbox'); // Returns a function, that, as long as it continues to be invoked, will not // be triggered. The function will be called after it stops being called for // N milliseconds. If `immediate` is passed, trigger the function on the // leading edge, instead of the trailing. function debounce(func, wait, immediate) { var timeout; return function() { var context = this, args = arguments; var later = function() { timeout = null; if (!immediate) func.apply(context, args); }; var callNow = immediate && !timeout; clearTimeout(timeout); timeout = setTimeout(later, wait); if (callNow) func.apply(context, args); }; }; let controller; let signal; var doSearch = debounce(function() { args = {'d': '/var/www/wsgi/cicjournal/webapp/search_index/xapian.db'} if (textinput.value) { args['q'] = textinput.value; if (controller !== undefined) { console.log('killing'); controller.abort(); } controller = new AbortController(); signal = controller.signal; let search_url = "https://cic.iacr.org/api/search" + "?" + new URLSearchParams(args); console.log(search_url); fetch(search_url, {signal}) .then((response) => response.json()) .then((data) => { console.log(data); let elem = document.getElementById('view'); if (elem) {elem.innerHTML = '';} if (data.results.length > 0) { document.getElementById('results').innerHTML = resultsTemplate(data); } else { document.getElementById('results').innerHTML = '<div class="p-3 shadow">no results</div>'; } controller = undefined; }).catch((error) => { console.log('error in fetch'); console.log(error); }); } else { console.log('no query'); } }, 500); // only after 250 ms. document.querySelectorAll('input').forEach((elem) => { elem.addEventListener('input', doSearch); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10