{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:35:30Z","timestamp":1764981330236,"version":"3.46.0"},"reference-count":27,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T00:00:00Z","timestamp":1605571200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties who share a low-entropy secret (a password) to securely establish cryptographic keys in the absence of public key infrastructure. We propose the first quantum-resistant password-authenticated key exchange scheme based on supersingular elliptic curve isogenies. The scheme is built upon supersingular isogeny Diffie-Hellman [15], and uses the password to generate permutations which obscure the auxiliary points. We include elements of a security proof, and discuss roadblocks to obtaining a proof in the BPR model [1]. We also include some performance results.<\/jats:p>","DOI":"10.1515\/jmc-2020-0071","type":"journal-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T15:54:50Z","timestamp":1606751690000},"page":"18-30","source":"Crossref","is-referenced-by-count":13,"title":["Towards Isogeny-Based Password-Authenticated Key Establishment"],"prefix":"10.1515","volume":"15","author":[{"given":"Oleg","family":"Taraskin","sequence":"first","affiliation":[{"name":"Waves Platform , Moscow , Russian Federation"}]},{"given":"Vladimir","family":"Soukharev","sequence":"additional","affiliation":[{"name":"InfoSec Global, Toronto , Ontario , Canada , M2J 5C2"}]},{"given":"David","family":"Jao","sequence":"additional","affiliation":[{"name":"University of Waterloo, 200 University Avenue West, Waterloo , Ontario , Canada , N2L 3G1"}]},{"given":"Jason T.","family":"LeGrow","sequence":"additional","affiliation":[{"name":"University of Waterloo, 200 University Avenue West, Waterloo , Ontario , Canada , N2L 3G1"}]}],"member":"374","published-online":{"date-parts":[[2020,11,17]]},"reference":[{"key":"2025120600293905966_j_jmc-2020-0071_ref_001","doi-asserted-by":"crossref","unstructured":"Mihir Bellare, David Pointcheval and Phillip Rogaway, Authenticated Key Exchange Secure against Dictionary Attacks, in: Advances in Cryptology\u2014 EUROCRYPT 2000 (Bart Preneel, ed.), pp. 139\u2013155, Springer Berlin Heidelberg, Berlin, Heidelberg, 2000.","DOI":"10.1007\/3-540-45539-6_11"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_002","doi-asserted-by":"crossref","unstructured":"Mihir Bellare and Phillip Rogaway, Entity Authentication and Key Distribution, in: Advances in Cryptology \u2014 CRYPTO \u201993 (Douglas R. Stinson, ed.), pp. 232\u2013249, Springer Berlin Heidelberg, Berlin, Heidelberg, 1994.","DOI":"10.1007\/3-540-48329-2_21"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_003","unstructured":"Steven M. Bellovin and Michael Merritt, Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks, in: IEEE Symposium On Research In Security And Privacy, pp. 72\u201384, 1992."},{"key":"2025120600293905966_j_jmc-2020-0071_ref_004","doi-asserted-by":"crossref","unstructured":"Reinier Br\u00f6ker, Denis Charles and Kristin Lauter, Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography, in: Proceedings of the 2nd International Conference on Pairing-Based Cryptography, pp. 100\u2013112, 2008.","DOI":"10.1007\/978-3-540-85538-5_7"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_005","doi-asserted-by":"crossref","unstructured":"Ran Canetti and Hugo Krawczyk, Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, in: EURO-CRYPT (Birgit Pfitzmann, ed.), Lecture Notes in Computer Science 2045, pp. 453\u2013474, Springer, 2001.","DOI":"10.1007\/3-540-44987-6_28"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_006","doi-asserted-by":"crossref","unstructured":"Ran Canetti and Hugo Krawczyk, Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, in: Advances in Cryptology\u2014EUROCRYPT 2001 (Birgit Pfitzmann, ed.), pp. 453\u2013474, Springer, Berlin, Heidelberg, 2001.","DOI":"10.1007\/3-540-44987-6_28"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_007","doi-asserted-by":"crossref","unstructured":"Denis Xavier Charles, Kristin E. Lauter and Eyal Z. Goren, Cryptographic Hash Functions from Expander Graphs, Journal of Cryptology 22 (2009), 93\u2013113.","DOI":"10.1007\/s00145-007-9002-x"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_008","doi-asserted-by":"crossref","unstructured":"Anamaria Costache, Brooke Feigon, Kristin Lauter, Maike Massierer and Anna Puskas, Ramanujan graphs in cryptography, Research Directions in Number Theory: Women in Numbers IV, AWM Springer Series (to appear), 2019, https:\/\/eprint.iacr.org\/2018\/593","DOI":"10.1007\/978-3-030-19478-9_1"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_009","doi-asserted-by":"crossref","unstructured":"Craig Costello, Patrick Longa and Michael Naehrig, Eflcient Algorithms for Supersingular Isogeny Difle-Hellman, in: Advances in Cryptology \u2013 CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I (Matthew Robshaw and Jonathan Katz, eds.), pp. 572\u2013601, Springer Berlin Heidelberg, Berlin, Heidelberg, 2016.","DOI":"10.1007\/978-3-662-53018-4_21"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_010","unstructured":"Jean-Marc Couveignes, Hard Homogeneous Spaces, 2006, http:\/\/eprint.iacr.org\/2006\/291\/"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_011","doi-asserted-by":"crossref","unstructured":"Luca De Feo, David Jao and J\u00e9r\u00f4me Pl\u00fbt, Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies, J. Math. Cryptol. 8 (2014), 209\u2013247.","DOI":"10.1515\/jmc-2012-0015"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_012","doi-asserted-by":"crossref","unstructured":"Jintai Ding, Saed Alsayigh, Jean Lancrenon, Saraswathy RV and Michael Snook, Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World, in: Topics in Cryptology \u2013 CT-RSA 2017 (Helena Handschuh, ed.), pp. 183\u2013204, Springer, Cham, 2017.","DOI":"10.1007\/978-3-319-52153-4_11"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_013","doi-asserted-by":"crossref","unstructured":"Steven D. Galbraith, Christophe Petit, Barak Shani and Yan Bo Ti, On the Security of Supersingular Isogeny Cryptosystems, in: Advances in Cryptology \u2013 ASIACRYPT 2016 (Jung Hee Cheon and Tsuyoshi Takagi, eds.), pp. 63\u201391, Springer Berlin Heidelberg, Berlin, Heidelberg, 2016.","DOI":"10.1007\/978-3-662-53887-6_3"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_014","unstructured":"David Jao, Reza Azarderakhsh, Matthew Campagna, Craig Costello, Luca De Feo, Basil Hess, Amir Jalali, Brian Koziel, Brian LaMacchia, Patrick Longa, Michael Naehrig, Geovandro Pereira, Joost Renes, Vladimir Soukharev and David Ubanik, Supersingular Isogeny Key Encapsulation, NIST Post-Quantum Cryptography Standardization Process, Report, 2019."},{"key":"2025120600293905966_j_jmc-2020-0071_ref_015","doi-asserted-by":"crossref","unstructured":"David Jao and Luca De Feo, Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies, in: PQCrypto (Bo-Yin Yang, ed.), Lecture Notes in Computer Science 7071, pp. 19\u201334, Springer, 2011.","DOI":"10.1007\/978-3-642-25405-5_2"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_016","doi-asserted-by":"crossref","unstructured":"David Jao and Vladimir Soukharev, A subexponential algorithm for evaluating large degree isogenies, Algorithmic number theory, Lecture Notes in Comput. Sci. 6197, Springer, Berlin, 2010, pp. 219\u2013233.","DOI":"10.1007\/978-3-642-14518-6_19"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_017","doi-asserted-by":"crossref","unstructured":"Brian LaMacchia, Kristin Lauter and Anton Mityagin, Stronger Security of Authenticated Key Exchange, in: Provable Security: First International Conference (Willy Susilo, Joseph K. Liu and Yi Mu, eds.), pp. 1\u201316, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007.","DOI":"10.1007\/978-3-540-75670-5_1"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_018","unstructured":"Jason LeGrow, Post-Quantum Security of Authenticated Key Establishment Protocols,Master\u2019s thesis, University ofWaterloo, 2016."},{"key":"2025120600293905966_j_jmc-2020-0071_ref_019","doi-asserted-by":"crossref","unstructured":"Vadim Lyubashevsky, Chris Peikert and Oded Regev, On Ideal Lattices and Learning with Errors over Rings, in: Advances in Cryptology \u2013 EUROCRYPT 2010 (Henri Gilbert, ed.), pp. 1\u201323, Springer Berlin Heidelberg, Berlin, Heidelberg, 2010.","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_020","doi-asserted-by":"crossref","unstructured":"Alfred J. Menezes, Tatsuaki Okamoto and Scott A. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Trans. Inform. Theory 39 (1993), 1639\u20131646.","DOI":"10.1109\/18.259647"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_021","doi-asserted-by":"crossref","unstructured":"Christophe Petit, Faster Algorithms for Isogeny Problems Using Torsion Point Images, in: Advances in Cryptology \u2013 ASI-ACRYPT 2017 (Tsuyoshi Takagi and Thomas Peyrin, eds.), pp. 330\u2013353, Springer International Publishing, Cham, 2017.","DOI":"10.1007\/978-3-319-70697-9_12"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_022","doi-asserted-by":"crossref","unstructured":"S. Pohlig and M. Hellman, An Improved Algorithm for Computing Logarithms over and Its Cryptographic Significance (Corresp.), IEEE Trans. Inf. Theor. 24 (2006), 106\u2013110.","DOI":"10.1109\/TIT.1978.1055817"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_023","unstructured":"Alexander Rostovtsev and Anton Stolbunov, Public-key cryptosystem based on isogenies, 2006, http:\/\/eprint.iacr.org\/2006\/145\/"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_024","doi-asserted-by":"crossref","unstructured":"Joseph H. Silverman, The Arithmetic of Elliptic Curves, Graduate Texts in Mathematics 106, Springer, New York, 1986.","DOI":"10.1007\/978-1-4757-1920-8"},{"key":"2025120600293905966_j_jmc-2020-0071_ref_025","unstructured":"Joseph H. Silverman, The arithmetic of elliptic curves, Graduate Texts in Mathematics 106, Springer-Verlag, New York, 1992."},{"key":"2025120600293905966_j_jmc-2020-0071_ref_026","unstructured":"Jacques V\u00e9lu, Isog\u00e9nies entre courbes elliptiques, C. R. Acad. Sci. Paris S\u00e9r. A-B 273 (1971), A238\u2013A241."},{"key":"2025120600293905966_j_jmc-2020-0071_ref_027","doi-asserted-by":"crossref","unstructured":"Jiang Zhang and Yu Yu, Two-Round PAKE from Approximate SPH and Instantiations from Lattices, in: Advances in Cryptology\u2014ASIACRYPT 2017 (Tsuyoshi Takagi and Thomas Peyrin, eds.), pp. 37\u201367, Springer, Cham, 2017.","DOI":"10.1007\/978-3-319-70700-6_2"}],"container-title":["Journal of Mathematical Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/jmc\/15\/1\/article-p18.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2020-0071\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2020-0071\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:30:42Z","timestamp":1764981042000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2020-0071\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,17]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,11,17]]},"published-print":{"date-parts":[[2020,11,17]]}},"alternative-id":["10.1515\/jmc-2020-0071"],"URL":"https:\/\/doi.org\/10.1515\/jmc-2020-0071","relation":{},"ISSN":["1862-2984"],"issn-type":[{"type":"electronic","value":"1862-2984"}],"subject":[],"published":{"date-parts":[[2020,11,17]]}}}