{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:46:13Z","timestamp":1769719573464,"version":"3.49.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319116587","type":"print"},{"value":"9783319116594","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11659-4_10","type":"book-chapter","created":{"date-parts":[[2014,9,24]],"date-time":"2014-09-24T22:19:48Z","timestamp":1411597188000},"page":"160-179","source":"Crossref","is-referenced-by-count":36,"title":["Isogeny-Based Quantum-Resistant Undeniable Signatures"],"prefix":"10.1007","author":[{"given":"David","family":"Jao","sequence":"first","affiliation":[]},{"given":"Vladimir","family":"Soukharev","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-45239-0_7","volume-title":"Cryptography and Coding","author":"C. Aguilar-Melchor","year":"2013","unstructured":"Aguilar-Melchor, C., Bettaieb, S., Gaborit, P., Schrek, J.: A code-based undeniable signature scheme. In: Stam, M. (ed.) IMACC 2013. LNCS, vol.\u00a08308, pp. 99\u2013119. Springer, Heidelberg (2013)"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-38616-9_1","volume-title":"Post-Quantum Cryptography","author":"M. Baldi","year":"2013","unstructured":"Baldi, M., Bianchi, M., Chiaraluce, F., Rosenthal, J., Schipani, D.: Using LDGM codes and sparse syndromes to achieve digital signatures. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol.\u00a07932, pp. 1\u201315. Springer, Heidelberg (2013)"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-642-12929-2_10","volume-title":"Post-Quantum Cryptography","author":"D. Boucher","year":"2010","unstructured":"Boucher, D., Gaborit, P., Geiselmann, W., Ruatta, O., Ulmer, F.: Key exchange and encryption schemes based on non-commutative skew polynomials. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol.\u00a06061, pp. 126\u2013141. Springer, Heidelberg (2010)"},{"issue":"3","key":"10_CR4","first-page":"269","volume":"1","author":"R. Br\u00f6ker","year":"2009","unstructured":"Br\u00f6ker, R.: Constructing supersingular elliptic curves. J. Comb. Number Theory\u00a01(3), 269\u2013273 (2009)","journal-title":"J. Comb. Number Theory"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-540-85538-5_7","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2008","author":"R. Br\u00f6ker","year":"2008","unstructured":"Br\u00f6ker, R., Charles, D., Lauter, K.: Evaluating large degree isogenies and applications to pairing based cryptography. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol.\u00a05209, pp. 100\u2013112. Springer, Heidelberg (2008)"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-642-25405-5_8","volume-title":"Post-Quantum Cryptography","author":"J. Buchmann","year":"2011","unstructured":"Buchmann, J., Dahmen, E., H\u00fclsing, A.: XMSS - A practical forward secure signature scheme based on minimal security assumptions. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol.\u00a07071, pp. 117\u2013129. Springer, Heidelberg (2011)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-13577-4_8","volume-title":"Advances in Computer Science and Information Technology","author":"P.-L. Cayrel","year":"2010","unstructured":"Cayrel, P.-L., Meziani, M.: Post-quantum cryptography: Code-based signatures. In: Kim, T.-H., Adeli, H. (eds.) AST\/UCMA\/ISA\/ACN 2010. LNCS, vol.\u00a06059, pp. 82\u201399. Springer, Heidelberg (2010)"},{"issue":"1","key":"10_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1515\/jmc-2012-0016","volume":"8","author":"A. Childs","year":"2014","unstructured":"Childs, A., Jao, D., Soukharev, V.: Constructing elliptic curve isogenies in quantum subexponential time. J. Math. Cryptol.\u00a08(1), 1\u201329 (2014)","journal-title":"J. Math. Cryptol."},{"key":"10_CR9","unstructured":"Couveignes, J.-M.: Hard homogeneous spaces (2006), \n                  \n                    http:\/\/eprint.iacr.org\/2006\/291\/"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-42045-0_4","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"\u00d6. Dagdelen","year":"2013","unstructured":"Dagdelen, \u00d6., Fischlin, M., Gagliardoni, T.: The Fiat\u2013Shamir Transformation in a Quantum World. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol.\u00a08270, pp. 62\u201381. Springer, Heidelberg (2013)"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-540-88403-3_8","volume-title":"Post-Quantum Cryptography","author":"E. Dahmen","year":"2008","unstructured":"Dahmen, E., Okeya, K., Takagi, T., Vuillaume, C.: Digital signatures out of second-preimage resistant hash functions. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol.\u00a05299, pp. 109\u2013123. Springer, Heidelberg (2008)"},{"issue":"2","key":"10_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. Journal of Cryptology\u00a01(2), 77\u201394 (1988)","journal-title":"Journal of Cryptology"},{"key":"10_CR13","unstructured":"De Feo, L., Jao, D., Pl\u00fbt, J.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. J. Math. Cryptol. (to appear), \n                  \n                    http:\/\/eprint.iacr.org\/2011\/506"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"A. Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 186\u2013194. Springer, Heidelberg (1987)"},{"key":"10_CR15","unstructured":"Fishbein, D.: Machine-level software optimization of cryptographic protocols. Master\u2019s thesis, University of Waterloo (2014), \n                  \n                    http:\/\/hdl.handle.net\/10012\/8400"},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1112\/S1461157000000097","volume":"2","author":"S.D. Galbraith","year":"1999","unstructured":"Galbraith, S.D.: Constructing isogenies between elliptic curves over finite fields. LMS J. Comput. Math.\u00a02, 118\u2013138 (electronic) (1999)","journal-title":"LMS J. Comput. Math."},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1145\/1374376.1374407","volume-title":"Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, STOC 2008","author":"C. Gentry","year":"2008","unstructured":"Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, STOC 2008, pp. 197\u2013206. ACM, New York (2008)"},{"issue":"3","key":"10_CR18","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1145\/116825.116852","volume":"38","author":"O. Goldreich","year":"1991","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the Association for Computing Machinery\u00a038(3), 690\u2013728 (1991)","journal-title":"Journal of the Association for Computing Machinery"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1007\/978-3-540-70583-3_48","volume-title":"Automata, Languages and Programming","author":"S. Hallgren","year":"2008","unstructured":"Hallgren, S., Kolla, A., Sen, P., Zhang, S.: Making classical honest verifier zero knowledge protocols secure against quantum attacks. In: Aceto, L., Damg\u00e5rd, I., Goldberg, L.A., Halld\u00f3rsson, M.M., Ing\u00f3lfsd\u00f3ttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol.\u00a05126, pp. 592\u2013603. Springer, Heidelberg (2008)"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-25405-5_2","volume-title":"Post-Quantum Cryptography","author":"D. Jao","year":"2011","unstructured":"Jao, D., De Feo, L.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol.\u00a07071, pp. 19\u201334. Springer, Heidelberg (2011)"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-642-14518-6_19","volume-title":"Algorithmic Number Theory","author":"D. Jao","year":"2010","unstructured":"Jao, D., Soukharev, V.: A subexponential algorithm for evaluating large degree isogenies. In: Hanrot, G., Morain, F., Thom\u00e9, E. (eds.) ANTS-IX. LNCS, vol.\u00a06197, pp. 219\u2013233. Springer, Heidelberg (2010)"},{"key":"10_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1007\/978-3-540-70583-3_43","volume-title":"Automata, Languages and Programming","author":"K. Kurosawa","year":"2008","unstructured":"Kurosawa, K., Furukawa, J.: Universally composable undeniable signature. In: Aceto, L., Damg\u00e5rd, I., Goldberg, L.A., Halld\u00f3rsson, M.M., Ing\u00f3lfsd\u00f3ttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol.\u00a05126, pp. 524\u2013535. Springer, Heidelberg (2008)"},{"key":"10_CR23","first-page":"409","volume-title":"Algebraic number fields: L-functions and Galois properties (Proc. Sympos., Univ. Durham, Durham, 1975)","author":"J.C. Lagarias","year":"1977","unstructured":"J.C. Lagarias, A.M. Odlyzko. Effective versions of the Chebotarev density theorem. In Algebraic number fields: L-functions and Galois properties (Proc. Sympos., Univ. Durham, Durham, 1975), pages 409\u2013464. Academic Press, London, 1977."},{"key":"10_CR24","first-page":"114","volume":"44","author":"R.J. McEliece","year":"1978","unstructured":"McEliece, R.J.: A Public-Key Cryptosystem Based On Algebraic Coding Theory. Deep Space Network Progress Report\u00a044, 114\u2013116 (1978)","journal-title":"Deep Space Network Progress Report"},{"key":"10_CR25","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-88702-7_5","volume-title":"Post-Quantum Cryptography","author":"D. Micciancio","year":"2009","unstructured":"Micciancio, D., Regev, O.: Lattice-based cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 147\u2013191. Springer, Heidelberg (2009)"},{"key":"10_CR26","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/1060590.1060603","volume-title":"Proceedings of the Thirty-seventh Annual ACM Symposium on Theory of Computing, STOC 2005","author":"O. Regev","year":"2005","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Proceedings of the Thirty-seventh Annual ACM Symposium on Theory of Computing, STOC 2005, pp. 84\u201393. ACM, New York (2005)"},{"issue":"5","key":"10_CR27","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P.W. Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput.\u00a026(5), 1484\u20131509 (1997), Preliminary version in FOCS 1994. arXiv:quant-ph\/9508027v2","journal-title":"SIAM J. Comput."},{"key":"10_CR28","series-title":"Graduate Texts in Mathematics","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-4252-7","volume-title":"The arithmetic of elliptic curves","author":"J.H. Silverman","year":"1992","unstructured":"Silverman, J.H.: The arithmetic of elliptic curves. Graduate Texts in Mathematics, vol.\u00a0106. Springer, New York (1992) (Corrected reprint of the 1986 original)"},{"issue":"2","key":"10_CR29","doi-asserted-by":"publisher","first-page":"215","DOI":"10.3934\/amc.2010.4.215","volume":"4","author":"A. Stolbunov","year":"2010","unstructured":"Stolbunov, A.: Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves. Adv. Math. Commun.\u00a04(2), 215\u2013235 (2010)","journal-title":"Adv. Math. Commun."},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Sun, X., Tian, H., Wang, Y.: Toward quantum-resistant strong designated verifier signature from isogenies. In: 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 292\u2013296 (2012)","DOI":"10.1109\/iNCoS.2012.70"},{"issue":"6","key":"10_CR31","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1006\/jsco.1999.0279","volume":"27","author":"E. Teske","year":"1999","unstructured":"Teske, E.: The Pohlig-Hellman method generalized for group structure computation. Journal of Symbolic Computation\u00a027(6), 521\u2013534 (1999)","journal-title":"Journal of Symbolic Computation"},{"key":"10_CR32","unstructured":"V\u00e9lu, J.: Isog\u00e9nies entre courbes elliptiques. C. R. Acad. Sci. Paris S\u00e9r. A-B 273, A238\u2013A241 (1971)"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Watrous, J.: Zero-knowledge against quantum attacks. In: Kleinberg, J.M. (ed.) STOC, pp. 296\u2013305. ACM (2006)","DOI":"10.1145\/1132516.1132560"},{"key":"10_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-38616-9_17","volume-title":"Post-Quantum Cryptography","author":"T. Yasuda","year":"2013","unstructured":"Yasuda, T., Takagi, T., Sakurai, K.: Multivariate signature scheme using quadratic forms. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol.\u00a07932, pp. 243\u2013258. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11659-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T19:55:07Z","timestamp":1558986907000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11659-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319116587","9783319116594"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11659-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}