On the Performance Analysis for CSIDH-Based Cryptosystems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Heo, Donghoe | - |
dc.contributor.author | Kim, Suhri | - |
dc.contributor.author | Park, Young-Ho | - |
dc.contributor.author | Hong, Seokhie | - |
dc.date.accessioned | 2021-08-30T13:50:13Z | - |
dc.date.available | 2021-08-30T13:50:13Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2020-10 | - |
dc.identifier.issn | 2076-3417 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/53029 | - |
dc.description.abstract | In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange algorithms have been proposed to optimize the CSIDH. In CSIDH, the private key is an ideal class in a class group, which can be represented by an integer vector. As the number of ideal classes represented by these vectors determines the security level of CSIDH, it is important to analyze whether the different vectors induce the same public key. In this regard, we generalize the existence of a collision for a base prime p equivalent to 7mod8. Based on our result, we present a new interval for the private key to have a similar security level for the various CSIDH-based algorithms for a fair comparison of the performance. Deduced from the implementation result, we conclude that for a prime p equivalent to 7mod8, CSIDH on the surface using the Montgomery curves is the most likely to be efficient. For a prime p equivalent to 3mod8, CSIDH on the floor using the hybrid method with Onuki's collision-free method is the most likely to be efficient and secure. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | MDPI | - |
dc.title | On the Performance Analysis for CSIDH-Based Cryptosystems | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hong, Seokhie | - |
dc.identifier.doi | 10.3390/app10196927 | - |
dc.identifier.scopusid | 2-s2.0-85092774001 | - |
dc.identifier.wosid | 000586383900001 | - |
dc.identifier.bibliographicCitation | APPLIED SCIENCES-BASEL, v.10, no.19 | - |
dc.relation.isPartOf | APPLIED SCIENCES-BASEL | - |
dc.citation.title | APPLIED SCIENCES-BASEL | - |
dc.citation.volume | 10 | - |
dc.citation.number | 19 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Chemistry | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Materials Science | - |
dc.relation.journalResearchArea | Physics | - |
dc.relation.journalWebOfScienceCategory | Chemistry, Multidisciplinary | - |
dc.relation.journalWebOfScienceCategory | Engineering, Multidisciplinary | - |
dc.relation.journalWebOfScienceCategory | Materials Science, Multidisciplinary | - |
dc.relation.journalWebOfScienceCategory | Physics, Applied | - |
dc.subject.keywordAuthor | post-quantum cryptography | - |
dc.subject.keywordAuthor | isogeny | - |
dc.subject.keywordAuthor | Montgomery curves | - |
dc.subject.keywordAuthor | CSIDH | - |
dc.subject.keywordAuthor | CSURF | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.