Skip to content
Snippets Groups Projects
Commit 4846432e authored by Philipp Muth's avatar Philipp Muth
Browse files

first slides

parent 73040f9c
Branches
No related tags found
No related merge requests found
\section{General Access Structures and Secret Sharing Schemes}
\begin{frame}
\end{frame}
\section{Actively Secure Key Exchange}
\begin{frame}
\end{frame}
...@@ -20,9 +20,17 @@ ...@@ -20,9 +20,17 @@
\begin{document} \begin{document}
\maketitle \maketitle
\section{Motivation} \input{motivation}
\begin{frame}
\end{frame} \input{key_exchange}
\input{signatures}
\input{generalsss}
\section{References}
\begin{frame}[allowframebreaks]
\bibliographystyle{amsalpha}
\bibliography{pqc}
\end{frame}
\end{document} \end{document}
\section{Motivation}
\begin{frame}
\frametitle{Where are we?}
\begin{block}{Hard Homogeneous Spaces}
A hard homogeneous space \(\left(\mathcal E,\mathcal G\right)\) is
\begin{itemize}
\item a set \(\mathcal E\),
\item a group \(\left(\mathcal G,\odot\right)\) and
\item an action \(\ast: \mathcal G\times \mathcal E \to \mathcal E\)
\end{itemize}
\end{block}
\pause
\begin{block}{Properties of \(\ast\)}
\begin{itemize}
\item Compatibility: \(\forall g,g' \in \mathcal G ~\forall E \in \mathcal E \colon g \ast \left(g'\ast E\right) = \left(g\odot g'\right) E\)
\item Identity: \(\forall E \in \mathcal E \colon i \ast E = E \Leftrightarrow i\) is the neutral element in \(\mathcal G\)
\item Transitivity: \(\forall E,E'\in \mathcal E ~\exists ! g \in \mathcal G \colon g \ast E = E'\)
\end{itemize}
\end{block}
\end{frame}
\begin{frame}
\frametitle{Key Exchange Mechanisms}
\begin{center}
\begin{tikzpicture}
\begin{scope}[minimum size = .7cm]
\node [alice] (alice) at (-3,0){Alice};
\node [bob] (bob) at (3,0){Bob};
\end{scope}
\pause
\node [left = .5 of alice] (pair) {$\left(\sk,\pk\right)$};
%\node [above = 3 of alice] (pk) {$\pk$};
%\draw [->] (alice) -- (pk);
\pause
\node [above = 2.5 of bob] (encaps) {$\encaps \paren* \pk$};
\node [above = 0.5 of bob] (keybob) {$\key$};
\node [above = 2.5 of alice] (cipher) {$c$};
\draw [->] (encaps) -- (cipher);
\draw [->] (encaps) -- (keybob);
\pause
\node [above = 1.5 of alice] (decaps) {$\decaps\paren *{\sk,c}$};
\draw [->] (cipher) -- (decaps);
\node [above = 0.5 of alice] (keyalice) {$\key$};
\draw [->] (decaps) -- (keyalice);
\pause
\node [draw, red, inner sep = -.1em, shape = rectangle, fit=(decaps)] {};
\end{tikzpicture}
\end{center}
\end{frame}
\begin{frame}
\frametitle{A Decapsulation Protocol with Shared Secret Key \cite{FeoM20}}
\begin{center}
\begin{tikzpicture}
\def\radius{2.5cm}
\begin{scope}[minimum size = .7cm]
\node [charlie] (sh1) at (40:3cm) {$s_1$};
\node [dave](sh2) at (140:3cm){$s_2$};
\node [maninblack] (sh3) at (220:3cm){$s_3$};
\node [physician] (sh4) at (320:3cm){$s_4$};
\node (sk) at (0,0) {$\sk$};
\draw [help lines] (sk) edge (sh1) edge (sh2) edge (sh3) edge (sh4);
\pause
\node [right=of sh1] (cipher) {$c$};
\coordinate [left = of sh2] (bla) ;
\draw [->] (cipher) -- (sh1);
\end{scope}
\end{tikzpicture}
\end{center}
\end{frame}
@inproceedings{DBLP:conf/crypto/DonFMS19,
author = {Jelle Don and
Serge Fehr and
Christian Majenz and
Christian Schaffner},
editor = {Alexandra Boldyreva and
Daniele Micciancio},
title = {Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle
Model},
booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {11693},
pages = {356--383},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-26951-7\_13},
doi = {10.1007/978-3-030-26951-7\_13},
timestamp = {Fri, 09 Apr 2021 18:35:29 +0200},
biburl = {https://dblp.org/rec/conf/crypto/DonFMS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonnetainS20,
author = {Xavier Bonnetain and
Andr{\'{e}} Schrottenloher},
editor = {Anne Canteaut and
Yuval Ishai},
title = {Quantum Security Analysis of {CSIDH}},
booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
Conference on the Theory and Applications of Cryptographic Techniques,
Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {12106},
pages = {493--522},
publisher = {Springer},
year = {2020},
url = {https://doi.org/10.1007/978-3-030-45724-2\_17},
timestamp = {Mon, 04 May 2020 14:35:02 +0200},
biburl = {https://dblp.org/rec/conf/eurocrypt/BonnetainS20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Peikert20,
author = {Chris Peikert},
editor = {Anne Canteaut and
Yuval Ishai},
title = {He Gives C-Sieves on the {CSIDH}},
booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
Conference on the Theory and Applications of Cryptographic Techniques,
Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {12106},
pages = {463--492},
publisher = {Springer},
year = {2020},
url = {https://doi.org/10.1007/978-3-030-45724-2\_16},
timestamp = {Mon, 04 May 2020 14:35:02 +0200},
biburl = {https://dblp.org/rec/conf/eurocrypt/Peikert20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@misc{Brandao_Davidson_Vassilev_2020,
title={{NIST roadmap toward criteria for threshold schemes for cryptographic primitives}},
url={http://dx.doi.org/10.6028/NIST.IR.8214A},
institution={National Institute of Standards and Technology},
author={Brandao, Luis T A N and Davidson, Michael and Vassilev, Apostol},
year={2020},
month={Jul} }
@inproceedings{DBLP:conf/ccs/LindellN18,
author = {Yehuda Lindell and
Ariel Nof},
editor = {David Lie and
Mohammad Mannan and
Michael Backes and
XiaoFeng Wang},
title = {Fast Secure Multiparty {ECDSA} with Practical Distributed Key Generation
and Applications to Cryptocurrency Custody},
booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2018, Toronto, ON, Canada, October
15-19, 2018},
pages = {1837--1854},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3243734.3243788},
timestamp = {Tue, 10 Nov 2020 20:00:51 +0100},
biburl = {https://dblp.org/rec/conf/ccs/LindellN18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couveignes06,
author = {Jean Marc Couveignes},
title = {Hard Homogeneous Spaces},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {291},
year = {2006},
url = {http://eprint.iacr.org/2006/291},
timestamp = {Mon, 11 May 2020 16:00:12 +0200},
biburl = {https://dblp.org/rec/journals/iacr/Couveignes06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/CozzoS20,
author = {Daniele Cozzo and
Nigel P. Smart},
editor = {Jintai Ding and
Jean{-}Pierre Tillich},
title = {Sashimi: Cutting up {CSI-FiSh} Secret Keys to Produce an Actively Secure
Distributed Signing Protocol},
booktitle = {Post-Quantum Cryptography - 11th International Conference, PQCrypto
2020, Paris, France, April 15-17, 2020, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {12100},
pages = {169--186},
publisher = {Springer},
year = {2020},
url = {{https://doi.org/10.1007/978-3-030-44223-1\_10}},
timestamp = {Mon, 04 May 2020 13:23:15 +0200},
biburl = {https://dblp.org/rec/conf/pqcrypto/CozzoS20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BeullensKV19,
author = {Ward Beullens and
Thorsten Kleinjung and
Frederik Vercauteren},
editor = {Steven D. Galbraith and
Shiho Moriai},
title = {{CSI-FiSh:} Efficient Isogeny Based Signatures Through Class Group Computations},
booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
on the Theory and Application of Cryptology and Information Security,
Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
series = {Lecture Notes in Computer Science},
volume = {11921},
pages = {227--247},
publisher = {Springer},
year = {2019},
url = {{https://doi.org/10.1007/978-3-030-34578-5\_9}},
timestamp = {Tue, 26 Nov 2019 14:13:27 +0100},
biburl = {https://dblp.org/rec/conf/asiacrypt/BeullensKV19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/CozzoS19,
author = {Daniele Cozzo and
Nigel P. Smart},
editor = {Martin Albrecht},
title = {Sharing the {LUOV:} Threshold Post-quantum Signatures},
booktitle = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC}
2019, Oxford, UK, December 16-18, 2019, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {11929},
pages = {128--153},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-35199-1\_7},
timestamp = {Thu, 19 Dec 2019 09:27:27 +0100},
biburl = {https://dblp.org/rec/conf/ima/CozzoS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/TraversoD018,
author = {Giulia Traverso and
Denise Demirel and
Johannes Buchmann},
editor = {Antoine Joux and
Abderrahmane Nitaj and
Tajjeeddine Rachidi},
title = {Performing Computations on Hierarchically Shared Secrets},
booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10831},
pages = {141--161},
publisher = {Springer},
year = {2018},
url = {{https://doi.org/10.1007/978-3-319-89339-6\_9}},
timestamp = {Tue, 14 May 2019 10:00:52 +0200},
biburl = {https://dblp.org/rec/conf/africacrypt/TraversoD018.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/TraversoDB16,
author = {Giulia Traverso and
Denise Demirel and
Johannes Buchmann},
editor = {Anderson C. A. Nascimento and
Paulo S. L. M. Barreto},
title = {Dynamic and Verifiable Hierarchical Secret Sharing},
booktitle = {Information Theoretic Security - 9th International Conference, {ICITS}
2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {10015},
pages = {24--43},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-49175-2\_2},
timestamp = {Mon, 16 Nov 2020 15:55:52 +0100},
biburl = {https://dblp.org/rec/conf/icits/TraversoDB16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HerranzS03,
author = {Javier Herranz and
Germ{\'{a}}n S{\'{a}}ez},
editor = {Rebecca N. Wright},
title = {Verifiable Secret Sharing for General Access Structures, with Application
to Fully Distributed Proxy Signatures},
booktitle = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe,
French West Indies, January 27-30, 2003, Revised Papers},
series = {Lecture Notes in Computer Science},
volume = {2742},
pages = {286--302},
publisher = {Springer},
year = {2003},
url = {{https://doi.org/10.1007/978-3-540-45126-6\_21}},
timestamp = {Tue, 14 May 2019 10:00:38 +0200},
biburl = {https://dblp.org/rec/conf/fc/HerranzS03.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Stadler96,
author = {Markus Stadler},
editor = {Ueli M. Maurer},
title = {Publicly Verifiable Secret Sharing},
booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
on the Theory and Application of Cryptographic Techniques, Saragossa,
Spain, May 12-16, 1996, Proceeding},
series = {Lecture Notes in Computer Science},
volume = {1070},
pages = {190--199},
publisher = {Springer},
year = {1996},
url = {https://doi.org/10.1007/3-540-68339-9\_17},
timestamp = {Tue, 14 May 2019 10:00:53 +0200},
biburl = {https://dblp.org/rec/conf/eurocrypt/Stadler96.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Pedersen91,
author = {Torben P. Pedersen},
editor = {Joan Feigenbaum},
title = {Non-Interactive and Information-Theoretic Secure Verifiable Secret
Sharing},
booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {576},
pages = {129--140},
publisher = {Springer},
year = {1991},
url = {{https://doi.org/10.1007/3-540-46766-1\_9}},
timestamp = {Fri, 17 Jul 2020 16:12:45 +0200},
biburl = {https://dblp.org/rec/conf/crypto/Pedersen91.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BackesKP11,
author = {Michael Backes and
Aniket Kate and
Arpita Patra},
editor = {Dong Hoon Lee and
Xiaoyun Wang},
title = {Computational Verifiable Secret Sharing Revisited},
booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
on the Theory and Application of Cryptology and Information Security,
Seoul, South Korea, December 4-8, 2011. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7073},
pages = {590--609},
publisher = {Springer},
year = {2011},
url = {https://doi.org/10.1007/978-3-642-25385-0\_32},
timestamp = {Tue, 14 May 2019 10:00:40 +0200},
biburl = {https://dblp.org/rec/conf/asiacrypt/BackesKP11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BethKO93,
author = {Thomas Beth and
Hans{-}Joachim Knobloch and
Marcus Otten},
editor = {Dorothy E. Denning and
Raymond Pyle and
Ravi Ganesan and
Ravi S. Sandhu and
Victoria Ashby},
title = {Verifiable Secret Sharing for Monotone Access Structures},
booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
pages = {189--194},
publisher = {{ACM}},
year = {1993},
url = {https://doi.org/10.1145/168588.168612},
timestamp = {Tue, 10 Nov 2020 20:00:40 +0100},
biburl = {https://dblp.org/rec/conf/ccs/BethKO93.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Tassa04,
author = {Tamir Tassa},
editor = {Moni Naor},
title = {Hierarchical Threshold Secret Sharing},
booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {2951},
pages = {473--490},
publisher = {Springer},
year = {2004},
url = {{https://doi.org/10.1007/978-3-540-24638-1\_26}},
timestamp = {Tue, 14 May 2019 10:00:47 +0200},
biburl = {https://dblp.org/rec/conf/tcc/Tassa04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Thorbek09,
author = {Rune Thorbek},
title = {Proactive Linear Integer Secret Sharing},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {183},
year = {2009},
url = {http://eprint.iacr.org/2009/183},
timestamp = {Mon, 11 May 2020 15:58:29 +0200},
biburl = {https://dblp.org/rec/journals/iacr/Thorbek09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardT06,
author = {Ivan Damg{\aa}rd and
Rune Thorbek},
editor = {Moti Yung and
Yevgeniy Dodis and
Aggelos Kiayias and
Tal Malkin},
title = {Linear Integer Secret Sharing and Distributed Exponentiation},
booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference
on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
April 24-26, 2006, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {3958},
pages = {75--90},
publisher = {Springer},
year = {2006},
url = {{https://doi.org/10.1007/11745853\_6}},
timestamp = {Fri, 01 May 2020 18:32:25 +0200},
biburl = {https://dblp.org/rec/conf/pkc/DamgardT06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BeullensDPV21,
author = {Ward Beullens and
Lucas Disson and
Robi Pedersen and
Frederik Vercauteren},
editor = {Jung Hee Cheon and
Jean{-}Pierre Tillich},
title = {{CSI-RAShi:} Distributed Key Generation for {CSIDH}},
booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto
2021, Daejeon, South Korea, July 20-22, 2021, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {12841},
pages = {257--276},
publisher = {Springer},
year = {2021},
url = {{https://doi.org/10.1007/978-3-030-81293-5\_14}},
timestamp = {Wed, 21 Jul 2021 15:51:05 +0200},
biburl = {https://dblp.org/rec/conf/pqcrypto/BeullensDPV21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@Article{Shamir:1979:HSS,
author = {Adi Shamir},
title = {How to Share a Secret},
journal = {Commun. {ACM}},
volume = {22},
number = {11},
pages = {612--613},
year = {1979},
url = {http://doi.acm.org/10.1145/359168.359176},
timestamp = {Wed, 14 Nov 2018 10:22:34 +0100},
biburl = {https://dblp.org/rec/journals/cacm/Shamir79.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@InProceedings{Blakley:1979:SCK,
author = "G. R. Blakley",
title = "Safeguarding cryptographic keys",
editor = "Richard E. Merwin and Jacqueline T. Zanca and Merlin.
Smith",
booktitle = "1979 National Computer Conference: June 4--7, 1979,
New York, New York",
volume = "48",
publisher = "AFIPS Press",
address = "pub-AFIPS:adr",
series = "AFIPS Conference proceedings",
pages = "313--317",
year = "1979",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = "Nelson H. F. Beebe, University of Utah, Department
of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake
City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1
801 581 4148, e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|, \path|beebe@computer.org|
(Internet), URL:
\path|http://www.math.utah.edu/~beebe/|",
referencedin = "Referenced in \cite[Ref. 3]{Canetti:1997:PSL},
\cite[Ref. 2]{Gemmell:1997:ITC}.",
xxauthor = "R. Blakley",
}
@inproceedings{LindellN18,
author = {Yehuda Lindell and
Ariel Nof},
editor = {David Lie and
Mohammad Mannan and
Michael Backes and
XiaoFeng Wang},
title = {Fast Secure Multiparty {ECDSA} with Practical Distributed Key Generation
and Applications to Cryptocurrency Custody},
booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2018, Toronto, ON, Canada, October
15-19, 2018},
pages = {1837--1854},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3243734.3243788},
timestamp = {Tue, 10 Nov 2020 20:00:51 +0100},
biburl = {https://dblp.org/rec/conf/ccs/LindellN18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DoernerKLS19,
author = {Jack Doerner and
Yashvanth Kondi and
Eysa Lee and
Abhi Shelat},
title = {Threshold {ECDSA} from {ECDSA} Assumptions: The Multiparty Case},
booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
CA, USA, May 19-23, 2019},
pages = {1051--1066},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/SP.2019.00024},
timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
biburl = {https://dblp.org/rec/conf/sp/DoernerKLS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DoernerKLS18,
author = {Jack Doerner and
Yashvanth Kondi and
Eysa Lee and
Abhi Shelat},
title = {Secure Two-party Threshold {ECDSA} from {ECDSA} Assumptions},
booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
21-23 May 2018, San Francisco, California, {USA}},
pages = {980--997},
publisher = {{IEEE} Computer Society},
year = {2018},
url = {https://doi.org/10.1109/SP.2018.00036},
timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
biburl = {https://dblp.org/rec/conf/sp/DoernerKLS18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{FeoM20,
author = {Luca De Feo and
Michael Meyer},
editor = {Aggelos Kiayias and
Markulf Kohlweiss and
Petros Wallden and
Vassilis Zikas},
title = {Threshold Schemes from Isogeny Assumptions},
booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
May 4-7, 2020, Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {12111},
pages = {187--212},
publisher = {Springer},
year = {2020},
url = {{https://doi.org/10.1007/978-3-030-45388-6\_7}},
timestamp = {Fri, 22 May 2020 21:56:39 +0200},
biburl = {https://dblp.org/rec/conf/pkc/FeoM20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
...@@ -11,7 +11,7 @@ ...@@ -11,7 +11,7 @@
\newcommand\assignTo[2]{#1 \leftarrow #2} \newcommand\assignTo[2]{#1 \leftarrow #2}
%\usepackage{todonotes} %remove for submission %\usepackage{todonotes} %remove for submission
%\let\labelindent\relax %\let\labelindent\relax
\usepackage{enumitem} %\usepackage{enumitem}
\usepackage[english]{babel} \usepackage[english]{babel}
\usepackage[utf8]{inputenc} \usepackage[utf8]{inputenc}
\usepackage{amsmath} \usepackage{amsmath}
...@@ -43,7 +43,8 @@ ...@@ -43,7 +43,8 @@
\usepackage{hyphenat} \usepackage{hyphenat}
\usepackage{tikz} \usepackage{tikz}
\usetikzlibrary{calc,arrows,intersections, through,positioning, matrix} \usetikzlibrary{arrows,calc,fit, matrix,intersections,positioning, through}
\usepackage{tikzpeople}
\usepackage{tcolorbox} \usepackage{tcolorbox}
%\usepackage{titlesec} %\usepackage{titlesec}
......
\section{Deriving a Signature Scheme}
\begin{frame}
\end{frame}
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment