{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T16:05:08Z","timestamp":1768925108880,"version":"3.49.0"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031828515","type":"print"},{"value":"9783031828522","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82852-2_7","type":"book-chapter","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:02:09Z","timestamp":1741784529000},"page":"151-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["SILBE: An\u00a0Updatable Public Key Encryption Scheme from\u00a0Lollipop Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4179-9547","authenticated-orcid":false,"given":"Max","family":"Duparc","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1821-8406","authenticated-orcid":false,"given":"Tako Boris","family":"Fouotsa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9185-1449","authenticated-orcid":false,"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"7_CR1","unstructured":"Asano, K., Watanabe, Y.: Updatable public key encryption with strong CCA security: security analysis and efficient generic construction. Cryptology ePrint Archive, Paper 2023\/976 (2023). https:\/\/eprint.iacr.org\/2023\/976"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Basso, A., et al.: SQIsign2D-west: the fast, the small, and the safer. Cryptology ePrint Archive, Paper 2024\/760 (2024). https:\/\/eprint.iacr.org\/2024\/760","DOI":"10.1007\/978-981-96-0891-1_11"},{"key":"7_CR3","doi-asserted-by":"publisher","unstructured":"Basso, A., Fouotsa, T.B.: New SIDH countermeasures for a more efficient key exchange. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT\u00a02023, Part\u00a0VIII. LNCS, vol. 14445, pp. 208\u2013233. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8742-9_7","DOI":"10.1007\/978-981-99-8742-9_7"},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Basso, A., Maino, L., Pope, G.: FESTA: Fast encryption from supersingular torsion attacks. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT\u00a02023, Part\u00a0VII. LNCS, vol. 14444, pp. 98\u2013126. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8739-9_4","DOI":"10.1007\/978-981-99-8739-9_4"},{"key":"7_CR5","doi-asserted-by":"publisher","unstructured":"Bernstein, D.J., Hamburg, M., Krasnova, A., Lange, T.: Elligator: elliptic-curve points indistinguishable from uniform random strings. In: Sadeghi, A.R., Gligor, V.D., Yung, M. (eds.) ACM CCS 2013, pp. 967\u2013980. ACM Press (2013). https:\/\/doi.org\/10.1145\/2508859.2516734","DOI":"10.1145\/2508859.2516734"},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 423\u2013447. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Castryck, W., Lange, T., Martindale, C., Panny, L., Renes, J.: CSIDH: An efficient post-quantum commutative group action. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT\u00a02018, Part\u00a0III. LNCS, vol. 11274, pp. 395\u2013427. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03332-3_15","DOI":"10.1007\/978-3-030-03332-3_15"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"Castryck, W., Vercauteren, F.: A polynomial time attack on instances of M-SIDH and FESTA. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT\u00a02023, Part\u00a0VII. LNCS, vol. 14444, pp. 127\u2013156. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8739-9_5","DOI":"10.1007\/978-981-99-8739-9_5"},{"key":"7_CR9","doi-asserted-by":"publisher","unstructured":"Charles, D.X., Lauter, K.E., Goren, E.Z.: Cryptographic hash functions from expander graphs. J. Cryptol. 22(1), 93\u2013113 (2009). https:\/\/doi.org\/10.1007\/s00145-007-9002-x","DOI":"10.1007\/s00145-007-9002-x"},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Dartois, P., Leroux, A., Robert, D., Wesolowski, B.: SQIsignHD: New dimensions in cryptography. In: Joye, M., Leander, G. (eds.) EUROCRYPT 2024, Part I. LNCS, vol. 14651, pp. 3\u201332. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58716-0_1","DOI":"10.1007\/978-3-031-58716-0_1"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Dartois, P., Maino, L., Pope, G., Robert, D.: An algorithmic approach to $$(2,2)$$-isogenies in the theta model and applications to isogeny-based cryptography. Cryptology ePrint Archive, Paper 2023\/1747 (2023). https:\/\/eprint.iacr.org\/2023\/1747","DOI":"10.1007\/978-981-96-0891-1_10"},{"key":"7_CR12","unstructured":"De\u00a0Feo, L.: Mathematics of isogeny based cryptography. arXiv preprint arXiv:1711.04062 (2017)"},{"key":"7_CR13","doi-asserted-by":"publisher","unstructured":"De Feo, L., et al.: S\u00e9ta: Supersingular encryption from torsion attacks. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT\u00a02021, Part\u00a0IV. LNCS, vol. 13093, pp. 249\u2013278. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92068-5_9","DOI":"10.1007\/978-3-030-92068-5_9"},{"issue":"3","key":"7_CR14","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1515\/jmc-2012-0015","volume":"8","author":"L De Feo","year":"2014","unstructured":"De Feo, L., Jao, D., Pl\u00fbt, J.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. J. Math. Cryptol. 8(3), 209\u2013247 (2014)","journal-title":"J. Math. Cryptol."},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s10623-014-0010-1","volume":"78","author":"C Delfs","year":"2016","unstructured":"Delfs, C., Galbraith, S.D.: Computing isogenies between supersingular elliptic curves over $$\\mathbb{F} _p$$. Des. Codes Crypt. 78, 425\u2013440 (2016)","journal-title":"Des. Codes Crypt."},{"key":"7_CR16","doi-asserted-by":"publisher","unstructured":"Deuring, M.: Die typen der multiplikatorenringe elliptischer funktionenk\u00f6rper. In: Abhandlungen aus dem mathematischen Seminar der Universit\u00e4t Hamburg. vol.\u00a014, pp. 197\u2013272. Springer Berlin\/Heidelberg (1941). https:\/\/doi.org\/10.1007\/BF02940746","DOI":"10.1007\/BF02940746"},{"key":"7_CR17","doi-asserted-by":"publisher","unstructured":"Dodis, Y., Karthikeyan, H., Wichs, D.: Updatable public key encryption in the standard model. In: Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8\u201311, 2021, Proceedings, Part III 19, pp. 254\u2013285. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-030-90456-2_9","DOI":"10.1007\/978-3-030-90456-2_9"},{"key":"7_CR18","doi-asserted-by":"publisher","unstructured":"Dodis, Y., Karthikeyan, H., Wichs, D.: Updatable public key encryption in the standard model. In: Nissim, K.,Waters, B. (eds.) Theory of Cryptography, pp. 254\u2013285. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-90456-2","DOI":"10.1007\/978-3-030-90456-2"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Duparc, M., Fouotsa, T.B.: SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies. Cryptology ePrint Archive, Paper 2024\/773 (2024). https:\/\/eprint.iacr.org\/2024\/773","DOI":"10.1007\/978-981-96-0891-1_13"},{"key":"7_CR20","doi-asserted-by":"publisher","unstructured":"Eaton, E., Jao, D., Komlo, C., Mokrani, Y.: Towards Post-Quantum Updatable Public-Key Encryption via Supersingular Isogenies. In: International Conference on Selected Areas in Cryptography, pp. 461\u2013482. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-030-99277-4_22","DOI":"10.1007\/978-3-030-99277-4_22"},{"key":"7_CR21","unstructured":"Fouotsa, T.B.: SIDH with masked torsion point images. Cryptology ePrint Archive, Paper 2022\/1054 (2022). https:\/\/eprint.iacr.org\/2022\/1054"},{"key":"7_CR22","doi-asserted-by":"publisher","unstructured":"Fouotsa, T.B., Moriya, T., Petit, C.: M-SIDH and MD-SIDH: countering SIDH attacks by masking information. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 282\u2013309. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_10","DOI":"10.1007\/978-3-031-30589-4_10"},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Haidar, C.A., Libert, B., Passel\u00e8gue, A.: Updatable public key encryption from DCR: Efficient constructions with stronger security. In: Yin, H., Stavrou, A., Cremers, C., Shi, E. (eds.) ACM CCS 2022, pp. 11\u201322. ACM Press (2022). https:\/\/doi.org\/10.1145\/3548606.3559376","DOI":"10.1145\/3548606.3559376"},{"key":"7_CR24","doi-asserted-by":"publisher","unstructured":"Haidar, C.A., Passel\u00e8gue, A., Stehl\u00e9, D.: Efficient updatable public-key encryption from lattices. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14442, pp. 342\u2013373. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8733-7_11","DOI":"10.1007\/978-981-99-8733-7_11"},{"key":"7_CR25","doi-asserted-by":"publisher","unstructured":"Jao, D., De Feo, L.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29\u2013December 2, 2011. Proceedings 4, pp. 19\u201334. Springer (2011). https:\/\/doi.org\/10.1007\/978-3-642-25405-5","DOI":"10.1007\/978-3-642-25405-5"},{"key":"7_CR26","doi-asserted-by":"publisher","unstructured":"Jiang, H., Zhang, Z., Chen, L., Wang, H., Ma, Z.: IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO\u00a02018, Part\u00a0III. LNCS, vol. 10993, pp. 96\u2013125. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96878-0_4","DOI":"10.1007\/978-3-319-96878-0_4"},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Kani, E.: The number of curves of genus two with elliptic differentials. J. f\u00fcr die reine und angewandte Mathematik 1997(485), 93\u2013122 (1997). https:\/\/doi.org\/10.1515\/1997.485.932","DOI":"10.1515\/1997.485.932"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Kohel, D., Lauter, K., Petit, C., Tignol, J.P.: On the quaternion-isogeny path problem. LMS J. Comput. Math. 17(A), 418\u2013432 (2014)","DOI":"10.1112\/S1461157014000151"},{"key":"7_CR29","unstructured":"Leroux, A.: Quaternion algebra and isogeny-based cryptography. Ph.D. thesis, Ecole doctorale de l\u2019Institut Polytechnique de Paris (2022). https:\/\/www.lix.polytechnique.fr\/Labo\/Antonin.LEROUX\/manuscrit_these.pdf"},{"key":"7_CR30","unstructured":"Leroux, A.: Verifiable random function from the Deuring correspondence and higher dimensional isogenies. Cryptology ePrint Archive, Paper 2023\/1251 (2023). https:\/\/eprint.iacr.org\/2023\/1251"},{"key":"7_CR31","doi-asserted-by":"publisher","unstructured":"Leroux, A., Rom\u00e9as, M.: Updatable encryption from group actions. In: Saarinen, M.J., Smith-Tone, D. (eds.) Post-Quantum Cryptography, pp. 20\u201353. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-62746-0_2","DOI":"10.1007\/978-3-031-62746-0_2"},{"key":"7_CR32","doi-asserted-by":"publisher","unstructured":"Lewi, K., Montgomery, H.W., Raghunathan, A.: Improved constructions of PRFs secure against related-key attacks. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 14International Conference on Applied Cryptography and Network Security. LNCS, vol.\u00a08479, pp. 44\u201361. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07536-5_4","DOI":"10.1007\/978-3-319-07536-5_4"},{"key":"7_CR33","doi-asserted-by":"publisher","unstructured":"Maino, L., Martindale, C., Panny, L., Pope, G., Wesolowski, B.: A direct key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 448\u2013471. Springer, Cham (2023).https:\/\/doi.org\/10.1007\/978-3-031-30589-4_16","DOI":"10.1007\/978-3-031-30589-4_16"},{"key":"7_CR34","doi-asserted-by":"publisher","unstructured":"Milne, J.S.: Abelian varieties. In: Arithmetic Geometry, pp. 103\u2013150. Springer, (1986). https:\/\/doi.org\/10.1007\/978-1-4613-8655-1_5","DOI":"10.1007\/978-1-4613-8655-1_5"},{"key":"7_CR35","unstructured":"Moriya, T.: IS-CUBE: An isogeny-based compact KEM using a boxed SIDH diagram. Cryptology ePrint Archive, Paper 2023\/1506 (2023). https:\/\/eprint.iacr.org\/2023\/1506"},{"key":"7_CR36","doi-asserted-by":"publisher","unstructured":"Nakagawa, K., Onuki, H.: QFESTA: Efficient algorithms and parameters for FESTA using quaternion algebras. In: Reyzin, L., Stebila, D. (eds.) CRYPTO\u00a02024, Part\u00a0V. LNCS, vol. 14924, pp. 75\u2013106. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-68388-6_4","DOI":"10.1007\/978-3-031-68388-6_4"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Nakagawa, K., Onuki, H.: SQIsign2D-east: a new signature scheme using 2-dimensional isogenies. Cryptology ePrint Archive, Paper 2024\/771 (2024). https:\/\/eprint.iacr.org\/2024\/771","DOI":"10.1007\/978-981-96-0891-1_9"},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Onuki, H., Nakagawa, K.: Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign. Cryptology ePrint Archive, Paper 2024\/778 (2024). https:\/\/eprint.iacr.org\/2024\/778","DOI":"10.1007\/978-981-96-0891-1_8"},{"key":"7_CR39","unstructured":"Robert, D.: Evaluating isogenies in polylogarithmic time. Cryptology ePrint Archive, Paper 2022\/1068 (2022). https:\/\/eprint.iacr.org\/2022\/1068"},{"key":"7_CR40","doi-asserted-by":"publisher","unstructured":"Robert, D.: Breaking SIDH in polynomial time. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 472\u2013503. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_17","DOI":"10.1007\/978-3-031-30589-4_17"},{"key":"7_CR41","unstructured":"Santos, M.C.R., Costello, C., Smith, B.: Efficient (3,3)-isogenies on fast kummer surfaces. Cryptology ePrint Archive, Paper 2024\/144 (2024). https:\/\/eprint.iacr.org\/2024\/144"},{"key":"7_CR42","series-title":"Graduate Texts in Mathematics","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09494-6","volume-title":"The Arithmetic of Elliptic Curves","author":"JH Silverman","year":"2009","unstructured":"Silverman, J.H.: The Arithmetic of Elliptic Curves. GTM, vol. 106. Springer, New York (2009). https:\/\/doi.org\/10.1007\/978-0-387-09494-6"},{"key":"7_CR43","first-page":"238","volume":"273","author":"J V\u00e9lu","year":"1971","unstructured":"V\u00e9lu, J.: Isog\u00e9nies entre courbes elliptiques. Comptes-Rendus de l\u2019Acad\u00e9mie des Sci. 273, 238\u2013241 (1971)","journal-title":"Comptes-Rendus de l\u2019Acad\u00e9mie des Sci."},{"issue":"5","key":"7_CR44","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1109\/TC.2018.2878829","volume":"68","author":"GH Zanon","year":"2018","unstructured":"Zanon, G.H., Simplicio, M.A., Pereira, G.C., Doliskani, J., Barreto, P.S.: Faster key compression for isogeny-based cryptosystems. IEEE Trans. Comput. 68(5), 688\u2013701 (2018)","journal-title":"IEEE Trans. Comput."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82852-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:02:18Z","timestamp":1741784538000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82852-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031828515","9783031828522"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82852-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montreal, QC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sacworkshop.org\/SAC24\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}