On the Method of Masking in the Multiple Signature Protocol Based on Isogenies of Elliptic Curves
Among the post-quantum algorithms selected by the National Institute of Standards and Technology (NIST) for standardization, the main mathematical apparatus is the mechanism of algebraic lattices, while the apparatus of hash functions is an alternative. Unlike isogenies of elliptic curves, these mec...
Gespeichert in:
| Veröffentlicht in: | Automatic control and computer sciences Jg. 58; H. 8; S. 1297 - 1302 |
|---|---|
| Hauptverfasser: | , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Moscow
Pleiades Publishing
01.12.2024
Springer Nature B.V |
| Schlagworte: | |
| ISSN: | 0146-4116, 1558-108X |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Zusammenfassung: | Among the post-quantum algorithms selected by the National Institute of Standards and Technology (NIST) for standardization, the main mathematical apparatus is the mechanism of algebraic lattices, while the apparatus of hash functions is an alternative. Unlike isogenies of elliptic curves, these mechanisms use larger sizes of both public keys and signatures. Using the example of a multiple signature protocol based on isogenies of elliptic curves, we will show how, using the masking method, we can protect against the main attack on the given device, while obtaining a smaller signature size. |
|---|---|
| Bibliographie: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 0146-4116 1558-108X |
| DOI: | 10.3103/S0146411624700950 |