On the Method of Masking in the Multiple Signature Protocol Based on Isogenies of Elliptic Curves
Among the post-quantum algorithms selected by the National Institute of Standards and Technology (NIST) for standardization, the main mathematical apparatus is the mechanism of algebraic lattices, while the apparatus of hash functions is an alternative. Unlike isogenies of elliptic curves, these mec...
Saved in:
| Published in: | Automatic control and computer sciences Vol. 58; no. 8; pp. 1297 - 1302 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Moscow
Pleiades Publishing
01.12.2024
Springer Nature B.V |
| Subjects: | |
| ISSN: | 0146-4116, 1558-108X |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Among the post-quantum algorithms selected by the National Institute of Standards and Technology (NIST) for standardization, the main mathematical apparatus is the mechanism of algebraic lattices, while the apparatus of hash functions is an alternative. Unlike isogenies of elliptic curves, these mechanisms use larger sizes of both public keys and signatures. Using the example of a multiple signature protocol based on isogenies of elliptic curves, we will show how, using the masking method, we can protect against the main attack on the given device, while obtaining a smaller signature size. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 0146-4116 1558-108X |
| DOI: | 10.3103/S0146411624700950 |