Secure Delegation of Isogeny Computations and Cryptographic Applications

被引:4
作者
Pedersen, Robi [1 ]
Uzunkol, Osmanbey [2 ]
机构
[1] Fernuniv, Fac Math & Comp Sci, Hagen, Germany
[2] Flensburg Univ Appl Sci, Fac Informat & Commun, Flensburg, Germany
来源
CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP | 2019年
关键词
Secure computation outsourcing; Post-quantum cryptographic protocols; Lightweight cryptography; Supersingular isogeny cryptography; ALGORITHMS;
D O I
10.1145/3338466.3358913
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We address the problem of speeding up isogeny computation for super-singular elliptic curves over finite fields using untrusted computational resources like third party servers or cloud service providers (CSPs). We first propose new, efficient and secure delegation schemes. This especially enables resource-constrained devices (e.g. smart cards, RFID tags, tiny sensor nodes) to effectively deploy post-quantum isogeny-based cryptographic protocols. To the best of our knowledge, these new schemes are the first attempt to generalize the classical secure delegation schemes for group exponentiations and pairing computation to an isogeny-based post-quantum setting. Then, we apply these secure delegation subroutines to improve the performance of supersingular isogeny-based zeroknowledge proofs of identity. Our experimental results show that, at the 128-bit quantum-security level, the proving party only needs about 3% of the original protocol cost, while the verifying party's effort is fully reduced to comparison operations. Lastly, we also apply our delegation schemes to decrease the computational cost of the decryption step for the NIST postquantum standardization candidate SIKE.
引用
收藏
页码:29 / 42
页数:14
相关论文
共 30 条
[21]   Scheduling real-time bag-of-tasks applications with approximate computations in SaaS clouds [J].
Stavrinides, Georgios L. ;
Karatza, Helen D. .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (01)
[22]   Enhancing healthcare security in the digital era: Safeguarding medical images with lightweight cryptographic techniques in IoT healthcare applications [J].
Nadhan, Archana S. ;
Jacob, Jeena .
BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2024, 88
[23]   SeCon-NG: Implementing a Lightweight Cryptographic Library based on ECDH and ECDSA for the Development of Secure and Privacy-Preserving Protocols in Contiki-NG [J].
Frimpong, Eugene ;
Michalas, Antonios .
PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, :767-769
[24]   SEECC: A Secure and Efficient Elliptic Curve Cryptosystem for E-health Applications [J].
Sahebi, Golnaz ;
Majd, Amin ;
Ebrahimi, Masoumeh ;
Plosila, Juha ;
Karimpour, Japer ;
Tenhunen, Hannu .
2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2016), 2016, :492-500
[25]   Towards Realising Secure and Efficient Image and Video Processing Applications on Quantum Computers [J].
Iliyasu, Abdullah M. .
ENTROPY, 2013, 15 (08) :2874-2974
[26]   Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing [J].
Boldyreva, Alexandra ;
Gentry, Craig ;
O'Neill, Adam ;
Yum, Dae Hyun .
CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, :276-+
[27]   Lightweight, Post-Quantum Secure Cryptography Based on Ascon: Hardware Implementation in Automotive Applications [J].
Nguyen, Hai Phong ;
Chen, Yuhua .
ELECTRONICS, 2024, 13 (22)
[28]   A secure and energy-efficient architecture in Internet of Things-cloud computing network by enhancing and combining three cryptographic techniques via defining new features, areas, and entities [J].
Farshadinia, Hojjat ;
Barati, Ali ;
Barati, Hamid .
JOURNAL OF SUPERCOMPUTING, 2025, 81 (08)
[29]   Secure image encryption using high throughput architectures of PRINT cipher for radio frequency identification applications [J].
Kumari, Manisha ;
Singh, Pulkit ;
Acharya, Bibhudendra .
JOURNAL OF ELECTRONIC IMAGING, 2022, 31 (06)
[30]   Efficient Software Implementations of Large Finite Fields GF(2n) for Secure Storage Applications [J].
Luo, Jianqiang ;
Bowers, Kevin D. ;
Oprea, Alina ;
Xu, Lihao .
ACM TRANSACTIONS ON STORAGE, 2012, 8 (01)