Skip to content
Snippets Groups Projects
Commit 2608c562 authored by Philipp Muth's avatar Philipp Muth
Browse files

minor

parent 612f87cd
No related branches found
No related tags found
No related merge requests found
\newif\ifpublic
\publictrue
\newif\ifshamir
\shamirtrue
\newif\ifsubsection
\subsectiontrue
%\documentclass[conference]{IEEEtran}
\documentclass[runningheads]{llncs}
%\pagestyle{plain}
\input{preamble}
% correct bad hyphenation here
%\hyphenation{op-tical net-works semi-conduc-tor}
\begin{document}
%
% paper title
% can use linebreaks \\ within to get better formatting as desired
\title{On Actively Secure Fine-Grained Access Structures from Isogeny Assumptions}
\titlerunning{On Actively Secure Access Structures from Isogeny Assumptions}
\ifpublic
\author{Fabio Campos\inst{1,2} \and Philipp Muth\inst{3}}
\authorrunning{}
\institute{\relax
RheinMain University of Applied Sciences, Wiesbaden, Germany
\and
Radboud University, Nijmegen, The Netherlands \\
\email{campos@sopmac.de}
\and
Technische Universität Darmstadt, Germany\\
\email{philipp.muth@tu-darmstadt.de}
}
\else
\author{}
\institute{}
\fi
%\author{\IEEEauthorblockN{Michael Shell}
%\IEEEauthorblockA{Georgia Institute of Technology\\someemail@somedomain.com}
%\and
%\IEEEauthorblockN{Homer Simpson}
%\IEEEauthorblockA{Twentieth Century Fox\\homer@thesimpsons.com}
%\and
%\IEEEauthorblockN{James Kirk\\ and Montgomery Scott}
%\IEEEauthorblockA{Starfleet Academy\\someemail@somedomain.com}}
%\IEEEoverridecommandlockouts
%\makeatletter\def\@IEEEpubidpullup{6.5\baselineskip}\makeatother
%\IEEEpubid{\parbox{\columnwidth}{
% Network and Distributed Systems Security (NDSS) Symposium 2021\\
% 21-24 February 2021\\
% ISBN 1-891562-66-5\\
% https://dx.doi.org/10.14722/ndss.2021.23xxx\\
% www.ndss-symposium.org
%}
%\hspace{\columnsep}\makebox[\columnwidth]{}}
% make the title area
\maketitle
\begin{abstract}
We present an actively secure threshold scheme in the setting of Hard Homogeneous Spaces (HHS) which allows fine-grained access structures. More precisely, we elevate a
%given
passively secure isogeny-based threshold scheme to an actively secure setting. We prove the active security and simulatability of our advanced schemes.
By characterising the necessary properties, we open our schemes to a significantly wider field of applicable secret sharing schemes. Furthermore, we show that Shamir's scheme has our generalised properties, and thereby our approach truly represents a less restrictive generalisation.
%In their recent work \cite{FeoM20}, DeFeo and Meyer introduced a method for executing isogeny based public key encryptions on a private key, that had been stored in Shamir's information theoretical secret sharing scheme \cite{Shamir:1979:HSS}. While their approach enables a distributed en- and decryption for a threshold scheme, it is rather restrictive in that the access structure is limited to sets of a minimum size and lacks granularity. Furthermore their approach is only passively secure, i.e., a misbehaving adversary can not be detected.
%In this work we elevate \cite{PKC:DeFMey20}'s scheme to an actively secure setting, that is misbehaving player's are detected while the protocol is being executed. We prove the active security and simulatability of our advanced schemes. Furthermore we expand the range of secret sharing schemes able to support DeFeo's and Meyer's approach by defining some characterising properties of suitable schemes. For schemes fulfilling said properties the same security guarantees hold in regards to \cite{PKC:DeFMey20}'s approach. Furthermore we show that Shamir's scheme has our generalised properties, and thereby our approach truly is a generalisation of \cite{PKC:DeFMey20}.
\begin{comment}In their recent work \cite{PKC:DeFMey20}, De Feo and Meyer introduced a method for executing isogeny-based public key encryption on a private key, that had been stored in Shamir's information theoretical secret sharing scheme \cite{Shamir:1979:HSS}. While their approach enables a distributed en- and decryption for a threshold scheme, it is rather restrictive in that the access structure is limited to sets of a minimum size and lacks granularity. Furthermore, their approach is only passively secure, i.e., a misbehaving adversary can not be detected.
In this work we elevate \cite{PKC:DeFMey20}'s scheme to an actively secure setting, that is misbehaving players are detected while the protocol is being executed. We prove the active security and simulatability of our advanced schemes. Furthermore, we expand the range of secret sharing schemes able to support De Feo's and Meyer's approach by defining some characterising properties of suitable schemes. For schemes fulfilling said properties the same security guarantees hold in regard to \cite{PKC:DeFMey20}'s approach. Furthermore, we show that Shamir's scheme has our generalised properties, and thereby our approach truly is a generalisation of \cite{PKC:DeFMey20}.
\end{comment}
\keywords{post-quantum cryptography
\and isogeny-based cryptography
\and threshold cryptography
}
\end{abstract}
% IEEEtran.cls defaults to using nonbold math in the Abstract.
% This preserves the distinction between vectors and scalars. However,
% if the conference you are submitting to favors bold math in the abstract,
% then you can use LaTeX's standard command \boldmath at the very start
% of the abstract to achieve this. Many IEEE journals/conferences frown on
% math in the abstract anyway.
\begingroup
\makeatletter
\def\@thefnmark{} \@footnotetext{\relax
Author list in alphabetical order; see
\url{https://www.ams.org/profession/leaders/culture/CultureStatement04.pdf}.}
\endgroup
%\tableofcontents
%\input{roadmap}
\input{introduction}
\input{preliminaries}
\input{keyexchange}
\input{signatures}
\input{generalsss}
\input{conclusion}
\ifpublic
\input{acknowledgements}
\fi
%\input{algorithms}
%\bibliographystyle{plain}
\bibliographystyle{splncs04}
\bibliography{pqc}
% Appendix
\newpage
\input{appendix}
% that's all folks
\end{document}
This diff is collapsed.
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment