On the Method of Masking in the Multiple Signature Protocol Based on Isogenies of Elliptic Curves

Among the post-quantum algorithms selected by the National Institute of Standards and Technology (NIST) for standardization, the main mathematical apparatus is the mechanism of algebraic lattices, while the apparatus of hash functions is an alternative. Unlike isogenies of elliptic curves, these mec...

Full description

Saved in:
Bibliographic Details
Published in:Automatic control and computer sciences Vol. 58; no. 8; pp. 1297 - 1302
Main Authors: Aleksandrova, E. B., Kostin, S. O.
Format: Journal Article
Language:English
Published: Moscow Pleiades Publishing 01.12.2024
Springer Nature B.V
Subjects:
ISSN:0146-4116, 1558-108X
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Among the post-quantum algorithms selected by the National Institute of Standards and Technology (NIST) for standardization, the main mathematical apparatus is the mechanism of algebraic lattices, while the apparatus of hash functions is an alternative. Unlike isogenies of elliptic curves, these mechanisms use larger sizes of both public keys and signatures. Using the example of a multiple signature protocol based on isogenies of elliptic curves, we will show how, using the masking method, we can protect against the main attack on the given device, while obtaining a smaller signature size.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0146-4116
1558-108X
DOI:10.3103/S0146411624700950