{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:34:28Z","timestamp":1767321268296,"version":"3.48.0"},"publisher-location":"Cham","reference-count":60,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032105356","type":"print"},{"value":"9783032105363","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10536-3_22","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:30:17Z","timestamp":1767321017000},"page":"589-615","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["How (not) to\u00a0Build Identity-Based Encryption from\u00a0Isogenies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4716-5625","authenticated-orcid":false,"given":"Elif","family":"\u00d6zbay G\u00fcrler","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7738-2017","authenticated-orcid":false,"given":"Patrick","family":"Struck","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, A., Fernando, R., Pinkas, B.\" Efficiently-thresholdizable batched identity based encryption, with applications. Cryptology ePrint Archive, Report 2024\/1575 (2024)","DOI":"10.1007\/978-3-032-01881-6_3"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/978-3-642-13190-5_28","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"S Agrawal","year":"2010","unstructured":"Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553\u2013572. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_28"},{"key":"22_CR3","doi-asserted-by":"publisher","unstructured":"Basso, A. et al. PRISM: simple and compact identification and signatures from large prime degree isogenies. In: Jager, T., Pan, J. (eds.) Public-Key Cryptography \u2013 PKC 2025. PKC 2025. LNCS, vol 15676. Springer, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-91826-1_10","DOI":"10.1007\/978-3-031-91826-1_10"},{"key":"22_CR4","doi-asserted-by":"publisher","unstructured":"Basso, A. et al.: Supersingular curves you can trust. In: Hazay, C., Stam, M. (eds) Advances in Cryptology \u2013 EUROCRYPT 2023. EUROCRYPT 2023. LNCS, vol 14005. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30617-4_14","DOI":"10.1007\/978-3-031-30617-4_14"},{"key":"22_CR5","series-title":"Part III, volume 15486 of LNCS","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-981-96-0891-1_11","volume-title":"ASIACRYPT 2024","author":"A Basso","year":"2024","unstructured":"Basso, A., Dartois, P., De Feo, L., Leroux, A., Maino, L., Pope, G., Robert, D., Wesolowski, B.: SQIsign2D-West - the fast, the small, and the safer. In: Chung, K.-M., Sasaki, Yu. (eds.) ASIACRYPT 2024. Part III, volume 15486 of LNCS, pp. 339\u2013370. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_11"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Andrea Basso, Luca De Feo, Pierrick Dartois, Antonin Leroux, Luciano Maino, Giacomo Pope, Damien Robert, and Benjamin Wesolowski. SQIsign2D-West: The fast, the small, and the safer. Cryptology ePrint Archive, Report 2024\/760, 2024","DOI":"10.1007\/978-981-96-0891-1_11"},{"key":"22_CR7","series-title":"Part VII, volume 14444 of LNCS","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-981-99-8739-9_4","volume-title":"ASIACRYPT 2023","author":"A Basso","year":"2023","unstructured":"Basso, A., Maino, L., Pope, G.: FESTA: Fast encryption from supersingular torsion attacks. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT 2023. Part VII, volume 14444 of LNCS, pp. 98\u2013126. Springer, Singapore (2023)"},{"issue":"11","key":"22_CR8","first-page":"3425","volume":"91","author":"W Beullens","year":"2023","unstructured":"Beullens, W., De Feo, L., Galbraith, S.D., Petit, C.: Proving knowledge of isogenies: a survey. DCC 91(11), 3425\u20133456 (2023)","journal-title":"DCC"},{"key":"22_CR9","series-title":"Part I, volume 11921 of LNCS","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-030-34578-5_9","volume-title":"ASIACRYPT 2019","author":"W Beullens","year":"2019","unstructured":"Beullens, W., Kleinjung, T., Vercauteren, F.: CSI-FiSh: efficient isogeny based signatures through class group computations. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019. Part I, volume 11921 of LNCS, pp. 227\u2013247. Springer, Cham (2019)"},{"key":"22_CR10","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Berlin, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44647-8_13"},{"key":"22_CR11","series-title":"Part V, volume 14008 of LNCS","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/978-3-031-30589-4_18","volume-title":"EUROCRYPT 2023","author":"D Boneh","year":"2023","unstructured":"Boneh, D., Guan, J., Zhandry, M.: A lower bound on the length of signatures based on group actions and generic isogenies. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023. Part V, volume 14008 of LNCS, pp. 507\u2013531. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_18"},{"key":"22_CR12","unstructured":"Booher, J., et al.: Failing to hash into supersingular isogeny graphs. Cryptology ePrint Archive, Report 2022\/518 (2022)"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-319-78381-9_20","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"Z Brakerski","year":"2018","unstructured":"Brakerski, Z., Lombardi, A., Segev, G., Vaikuntanathan, V.: Anonymous IBE, leakage resilience and circular security from new assumptions. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10820, pp. 535\u2013564. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78381-9_20"},{"key":"22_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-642-13190-5_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"D Cash","year":"2010","unstructured":"Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai trees, or how to delegate a lattice basis. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 523\u2013552. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_27"},{"key":"22_CR15","series-title":"Part III, volume 11274 of LNCS","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-3-030-03332-3_1","volume-title":"ASIACRYPT 2018","author":"W Castryck","year":"2018","unstructured":"Castryck, W., Lange, T., Martindale, C., Panny, L., Renes, J.: CSIDH: an efficient post-quantum commutative group action. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. Part III, volume 11274 of LNCS, pp. 395\u2013427. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03332-3_1"},{"key":"22_CR16","series-title":"Part VII, volume 14444 of LNCS","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-981-99-8739-9_5","volume-title":"ASIACRYPT 2023","author":"W Castryck","year":"2023","unstructured":"Castryck, W., Vercauteren, F.: A polynomial time attack on instances of M-SIDH and FESTA. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT 2023. Part VII, volume 14444 of LNCS, pp. 127\u2013156. Springer, Singapore (2023)"},{"issue":"1","key":"22_CR17","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s00145-007-9002-x","volume":"22","author":"DX Charles","year":"2009","unstructured":"Charles, D.X., Lauter, K.E., Goren, E.Z.: Cryptographic hash functions from expander graphs. J. Cryptol. 22(1), 93\u2013113 (2009)","journal-title":"J. Cryptol."},{"key":"22_CR18","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"8th IMA International Conference on Cryptography and Coding","author":"C Cocks","year":"2001","unstructured":"Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) 8th IMA International Conference on Cryptography and Coding. LNCS, vol. 2260, pp. 360\u2013363. Springer, Berlin, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45325-3_32"},{"key":"22_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-540-75670-5_16","volume-title":"Provable Security","author":"Y Cui","year":"2007","unstructured":"Cui, Y., Fujisaki, E., Hanaoka, G., Imai, H., Zhang, R.: Formal security treatments for signatures from identity-based encryption. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 218\u2013227. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-75670-5_16"},{"key":"22_CR20","series-title":"Part I, volume 14651 of LNCS","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-031-58716-0_1","volume-title":"EUROCRYPT 2024","author":"P Dartois","year":"2024","unstructured":"Dartois, P., Leroux, A., Robert, D., Wesolowski, B.: SQIsignHD: new dimensions in cryptography. In: Joye, M., Leander, G. (eds.) EUROCRYPT 2024. Part I, volume 14651 of LNCS, pp. 3\u201332. Springer, Cham (2024)"},{"key":"22_CR21","doi-asserted-by":"publisher","unstructured":"De Feo, L., Fouotsa, T.B., Panny, L.: Isogeny problems with level structure. In: Joye, M., Leander, G. (eds.) EUROCRYPT 2024. Part VII, vol. 14657. LNCS, pp. 181\u2013204. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58754-2_7","DOI":"10.1007\/978-3-031-58754-2_7"},{"key":"22_CR22","series-title":"Part III, volume 11478 of LNCS","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/978-3-030-17659-4_26","volume-title":"EUROCRYPT 2019","author":"L De Feo","year":"2019","unstructured":"De Feo, L., Galbraith, S.D.: SeaSign: Compact isogeny signatures from class group actions. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. Part III, volume 11478 of LNCS, pp. 759\u2013789. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17659-4_26"},{"key":"22_CR23","series-title":"Part I, volume 12491 of LNCS","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-030-64837-4_3","volume-title":"ASIACRYPT 2020","author":"L De Feo","year":"2020","unstructured":"De Feo, L., Kohel, D., Leroux, A., Petit, C., Wesolowski, B.: SQISign: compact post-quantum signatures from quaternions and isogenies. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. Part I, volume 12491 of LNCS, pp. 64\u201393. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_3"},{"key":"22_CR24","series-title":"Part I, volume 11272 of LNCS","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-030-03326-2_3","volume-title":"ASIACRYPT 2018","author":"T Debris-Alazard","year":"2018","unstructured":"Debris-Alazard, T., Tillich, J.-P.: Two attacks on rank metric code-based schemes: RankSign and an IBE scheme. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. Part I, volume 11272 of LNCS, pp. 62\u201392. Springer, Cham (2018)"},{"issue":"6","key":"22_CR25","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"22_CR26","series-title":"Part I, volume 10677 of LNCS","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-3-319-70500-2_13","volume-title":"TCC 2017","author":"N D\u00f6ttling","year":"2017","unstructured":"D\u00f6ttling, N., Garg, S.: From selective IBE to full IBE and selective HIBE. In: Kalai, Y., Reyzin, L. (eds.) TCC 2017. Part I, volume 10677 of LNCS, pp. 372\u2013408. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70500-2_13"},{"key":"22_CR27","series-title":"Part I, volume 10401 of LNCS","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/978-3-319-63688-7_18","volume-title":"CRYPTO 2017","author":"N D\u00f6ttling","year":"2017","unstructured":"D\u00f6ttling, N., Garg, S.: Identity-based encryption from the Diffie-Hellman assumption. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. Part I, volume 10401 of LNCS, pp. 537\u2013569. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_18"},{"key":"22_CR28","series-title":"Part III, volume 15486 of LNCS","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/978-981-96-0891-1_13","volume-title":"ASIACRYPT 2024","author":"Max Duparc and Tako Boris Fouotsa","year":"2024","unstructured":"Max Duparc and Tako Boris Fouotsa: SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies. In: Chung, K.-M., Sasaki, Yu. (eds.) ASIACRYPT 2024. Part III, volume 15486 of LNCS, pp. 396\u2013429. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_13"},{"key":"22_CR29","doi-asserted-by":"publisher","unstructured":"Duparc, M., Fouotsa, T.B., Vaudenay, S.: SILBE: an updatable public key encryption scheme from lollipop attacks. In: Eichlseder, M., Gambs, S. (eds.) Selected Areas in Cryptography \u2013 SAC 2024. SAC 2024. LNCS, vol 15516. Springer, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-82852-2_7","DOI":"10.1007\/978-3-031-82852-2_7"},{"key":"22_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-319-78372-7_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"K Eisentr\u00e4ger","year":"2018","unstructured":"Eisentr\u00e4ger, K., Hallgren, S., Lauter, K., Morrison, T., Petit, C.: Supersingular isogeny graphs and endomorphism rings: reductions and solutions. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10822, pp. 329\u2013368. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78372-7_11"},{"key":"22_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-030-29962-0_6","volume-title":"Computer Security \u2013 ESORICS 2019","author":"K Emura","year":"2019","unstructured":"Emura, K., Katsumata, S., Watanabe, Y.: Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11736, pp. 113\u2013133. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29962-0_6"},{"key":"22_CR32","unstructured":"Fouotsa, T.B., Marco, L.: Towards identity based encryption from M-SIDH and the SIDH attacks. Presented at Leuven Isogeny Days 4, Leuven Belgium (2023). Accessed 13th January 2025"},{"key":"22_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-319-63697-9_7","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"P Gaborit","year":"2017","unstructured":"Gaborit, P., Hauteville, A., Phan, D.H., Tillich, J.-P.: Identity-based encryption from codes with rank metric. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10403, pp. 194\u2013224. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63697-9_7"},{"key":"22_CR34","series-title":"PQCrypto 2014","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-319-11659-4_6","volume-title":"Post-Quantum Cryptography - 6th International Workshop","author":"P Gaborit","year":"2014","unstructured":"Gaborit, P., Ruatta, O., Schrek, J., Z\u00e9mor, G.: RankSign: an efficient signature algorithm based on the rank metric. In: Mosca, M. (ed.) Post-Quantum Cryptography - 6th International Workshop. PQCrypto 2014, pp. 88\u2013107. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11659-4_6"},{"key":"22_CR35","unstructured":"Galbraith, S.D., Petit, C., Silva, J.: Identification protocols and signature schemes based on supersingular isogeny problems. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. Part I, vol. 10624. LNCS, pp. 3\u201333. Springer, Cham (2017)"},{"key":"22_CR36","doi-asserted-by":"crossref","unstructured":"Galbraith, S.D., Vercauteren, F.: Computational problems in supersingular elliptic curve isogenies. Cryptology ePrint Archive, Report 2017\/774 (2017)","DOI":"10.1007\/s11128-018-2023-6"},{"key":"22_CR37","doi-asserted-by":"crossref","unstructured":"Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Ladner, R.E., Dwork, C (eds.) 40th ACM STOC, pp.197\u2013206. ACM Press (May 2008)","DOI":"10.1145\/1374376.1374407"},{"key":"22_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-25405-5_2","volume-title":"Post-Quantum Cryptography","author":"D Jao","year":"2011","unstructured":"Jao, D., De Feo, L.: Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 19\u201334. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25405-5_2"},{"key":"22_CR39","series-title":"Part I, volume 15516 of LNCS","first-page":"259","volume-title":"SAC 2024","author":"W Ji","year":"2024","unstructured":"Ji, W., et al.: Identity-based encryption from lattices with more compactness in the standard model. In: Eichlseder, M., Gambs, S. (eds.) SAC 2024. Part I, volume 15516 of LNCS, pp. 259\u2013281. Springer, Cham (2024)"},{"key":"22_CR40","unstructured":"Jiang, Y., Zhu, Y., Wang, J., Zhang, Y.: Efficient online and non-interactive threshold signatures with identifiable aborts for identity-based signatures in the IEEE P1363 standard. Cryptology ePrint Archive, Report 2024\/1333 (2024)"},{"key":"22_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1007\/978-3-662-53890-6_23","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"S Katsumata","year":"2016","unstructured":"Katsumata, S., Yamada, S.: Partitioning via non-linear polynomial functions: more compact IBEs from ideal lattices and bilinear maps. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10032, pp. 682\u2013712. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53890-6_23"},{"key":"22_CR42","doi-asserted-by":"crossref","unstructured":"Love, J., Boneh, D.: Supersingular curves with small non-integer endomorphisms (2020)","DOI":"10.2140\/obs.2020.4.7"},{"key":"22_CR43","unstructured":"Lu, X., Fan, J., Au, M.H.: Relaxed lattice-based programmable hash functions: New efficient adaptively secure IBEs. Cryptology ePrint Archive, Report 2024\/1535 (2024)"},{"key":"22_CR44","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/3-540-45961-8_39","volume-title":"EUROCRYPT\u201988","author":"T Matsumoto","year":"1988","unstructured":"Matsumoto, T., Imai, H.: Public quadratic polynominal-tuples for efficient signature-verification and message-encryption. In: G\u00fcnther, C.G. (ed.) EUROCRYPT\u201988. LNCS, vol. 330, pp. 419\u2013453. Springer, Berlin, Heidelberg (1988). https:\/\/doi.org\/10.1007\/3-540-45961-8_39"},{"key":"22_CR45","unstructured":"Merdy, A.H.L., Wesolowski, B.: The supersingular endomorphism ring problem given one endomorphism. Cryptology ePrint Archive, Report 2023\/1448 (2023)"},{"key":"22_CR46","series-title":"Part I, volume 15516 of LNCS","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-031-82852-2_1","volume-title":"SAC 2024","author":"A Mitrokotsa","year":"2024","unstructured":"Mitrokotsa, A., Mukherjee, S., Tomy, J.: Oblivious identity-based encryption - (IBE secure against an adversarial KGC). In: Eichlseder, M., Gambs, S. (eds.) SAC 2024. Part I, volume 15516 of LNCS, pp. 282\u2013309. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-82852-2_1"},{"key":"22_CR47","unstructured":"Mula, M., Murru, N., Pintore, F.: Random sampling of supersingular elliptic curves. Cryptology ePrint Archive, Report 2022\/528 (2022)"},{"key":"22_CR48","doi-asserted-by":"crossref","unstructured":"Nakagawa, K., Onuki, H.: SQIsign2D-East: A new signature scheme using 2-dimensional isogenies. Cryptology ePrint Archive, Report 2024\/771 (2024)","DOI":"10.1007\/978-981-96-0891-1_9"},{"key":"22_CR49","series-title":"Part III, volume 15486 of LNCS","first-page":"272","volume-title":"ASIACRYPT 2024","author":"K Nakagawa","year":"2024","unstructured":"Nakagawa, K., et al.: SQIsign2D-East: A new signature scheme using 2-dimensional isogenies. In: Chung, K.-M., Sasaki, Yu. (eds.) ASIACRYPT 2024. Part III, volume 15486 of LNCS, pp. 272\u2013303. Springer, Singapore (2024)"},{"key":"22_CR50","unstructured":"National Institute of\u00a0Standards and Technology. Call for additional digital signature schemes for the post-quantum cryptography standardization process (2022). https:\/\/csrc.nist.gov\/csrc\/media\/Projects\/pqc-dig-sig\/documents\/call-for-proposals-dig-sig-sept-2022.pdf"},{"key":"22_CR51","series-title":"Part VI, volume 14656 of LNCS","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/978-3-031-58751-1_14","volume-title":"EUROCRYPT 2024","author":"A Page","year":"2024","unstructured":"Page, A., Wesolowski, B.: The supersingular endomorphism ring and one endomorphism problems are equivalent. In: Joye, M., Leander, G. (eds.) EUROCRYPT 2024. Part VI, volume 14656 of LNCS, pp. 388\u2013417. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58751-1_14"},{"key":"22_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/3-540-44750-4_20","volume-title":"Advances in Cryptology \u2014 CRYPT0\u2019 95","author":"J Patarin","year":"1995","unstructured":"Patarin, J.: Cryptanalysis of the matsumoto and imai public key scheme of Eurocrypt\u201988. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 248\u2013261. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-44750-4_20"},{"key":"22_CR53","volume":"54","author":"C Peng","year":"2020","unstructured":"Peng, C., Chen, J., Zhou, L., Choo, K.-K.R., He, D.: Csiibs: a post-quantum identity-based signature scheme based on isogenies. J. Inform. Sec. Appli. 54, 102504 (2020)","journal-title":"J. Inform. Sec. Appli."},{"key":"22_CR54","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1090\/S0273-0979-1990-15918-X","volume":"23","author":"AK Pizer","year":"1990","unstructured":"Pizer, A.K.: Ramanujan graphs and hecke operators. Bull. Am. Math. Soc. 23, 127\u2013137 (1990)","journal-title":"Bull. Am. Math. Soc."},{"key":"22_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). https:\/\/doi.org\/10.1007\/3-540-39568-7_5"},{"key":"22_CR56","volume":"69","author":"S Shaw","year":"2022","unstructured":"Shaw, S., Dutta, R.: Post-quantum secure identity-based signature achieving forward secrecy. J. Inform. Sec. Appli. 69, 103275 (2022)","journal-title":"J. Inform. Sec. Appli."},{"key":"22_CR57","doi-asserted-by":"crossref","unstructured":"Wesolowski, B.: The supersingular isogeny path and endomorphism ring problems are equivalent. In: 62nd FOCS, pp. 1100\u20131111. IEEE Computer Society Press (February 2022)","DOI":"10.1109\/FOCS52979.2021.00109"},{"key":"22_CR58","series-title":"Part II, volume 9666 of LNCS","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-662-49896-5_2","volume-title":"EUROCRYPT 2016","author":"S Yamada","year":"2016","unstructured":"Yamada, S.: Adaptively secure identity-based encryption from lattices with asymptotically shorter public parameters. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. Part II, volume 9666 of LNCS, pp. 32\u201362. Springer, Berlin, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_2"},{"key":"22_CR59","series-title":"Part III, volume 10403 of LNCS","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-319-63697-9_6","volume-title":"CRYPTO 2017","author":"S Yamada","year":"2017","unstructured":"Yamada, S.: Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. Part III, volume 10403 of LNCS, pp. 161\u2013193. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63697-9_6"},{"key":"22_CR60","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1007\/978-3-642-32009-5_44","volume-title":"CRYPTO 2012","author":"M Zhandry","year":"2012","unstructured":"Zhandry, M.: Secure identity-based encryption in the quantum random oracle model. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 758\u2013775. Springer, Berlin, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_44"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10536-3_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:30:20Z","timestamp":1767321020000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10536-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032105356","9783032105363"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10536-3_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sacworkshop.org\/SAC25\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}