Advanced threshold signature schemes leveraging isogeny-based cryptography
1 Faculty of sciences Dhar Almahraz.
2 Sidi Mohammed Ben Abdellah University, Fez, Morocco.
Review Article
Global Journal of Engineering and Technology Advances, 2024, 21(02), 047–056.
Article DOI: 10.30574/gjeta.2024.21.2.0199
Publication history:
Received on 17 September 2024; revised on 30 October 2024; accepted on 02 November 2024
Abstract:
This paper investigates the use of threshold signature schemes in isogeny-based cryptosystems. By leveraging the distinct features of isogeny graphs, we propose a protocol that offers high security and practical efficiency, making it ideal for distributed ledger technologies and secure multi-party computations. Our scheme is resistant to quantum attacks and maintains minimal computational and communication overheads. We present an extensive analysis of the security and performance of our protocol, emphasizing its relevance to real-world cryptographic systems. MSC 2020: 94A60, 11G07, 68M07.
Keywords:
Isogeny; Cryptography; Security; Threshold signature; Post-quantum
Full text article in PDF:
Copyright information:
Copyright © 2024 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0