Communications in Cryptology IACR CiC

Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies

Authors

Giacomo Borin, Yi-Fu Lai, Antonin Leroux
Giacomo Borin ORCID
IBM Research - Zurich, Rüschlikon, Switzerland
University of Zurich, Zurich, Switzerland
erebor at gbor dot in
Yi-Fu Lai ORCID
Ruhr University Bochum, Bochum, Germany
yi-fu dot lai at rub dot de
Antonin Leroux ORCID
DGA Maitrise de l'information, Bruz, France
Université de Rennes, Rennes, France
antonin dot leroux at polytechnique dot org

Abstract

We construct two efficient post-quantum ring signatures with anonymity against full key exposure from isogenies, addressing the limitations of existing isogeny-based ring signatures.

First, we present an efficient concrete distinguisher for the SQIsign simulator when the signing key is provided using one transcript. This shows that turning SQIsign into an efficient full anonymous ring signature requires some new ideas.

Second, we propose a variant of SQIsign (Asiacrypt'20) that is resistant to the distinguisher attack with only a x1.4 increase in size and we render it to a ring signature, that we refer to as Erebor. This variant introduces a new zero-knowledge assumption that ensures full anonymity. The efficiency of Erebor remains comparable to that of SQIsign, with only a proportional increase due to the ring size. This results in a signature size of 0.71 KB for 4 users and 1.41 KB for 8 users, making it the most compact post-quantum ring signature for up to 29 users.

Third, we revisit the GPS signature scheme (Asiacrypt'17), developing efficient subroutines to make the scheme more efficient and significantly reduce the resulting signature size. By integrating our scheme with the paradigm by Beullens, Katsumata, and Pintore (Asiacrypt’20), we achieve an efficient logarithmic ring signature, that we call Durian, resulting in a signature size of 9.87 KB for a ring of size 1024.

References

[AABN02]
Michel Abdalla, Jee Hea An and Mihir Bellare, and Chanathip Namprempre. From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. In Lars R. Knudsen, editor, EUROCRYPT 2002, volume 2332 of LNCS, pages 418–433. 2002. Springer, Heidelberg. DOI: 10.1007/3-540-46035-7_28
[AOS02]
Masayuki Abe, Miyako Ohkubo, and Koutarou Suzuki. 1-out-of-n Signatures from a Variety of Keys. In Yuliang Zheng, editor, ASIACRYPT 2002, volume 2501 of LNCS, pages 415–432. December 2002. Springer, Heidelberg. DOI: 10.1007/3-540-36178-2_26
[BCC+23]
Andrea Basso, Giulio Codogni, Deirdre Connolly, Luca De Feo, Tako Boris Fouotsa, Guido Maria Lido, Travis Morrison, Lorenz Panny, Sikhar Patranabis, and Benjamin Wesolowski. Supersingular Curves You Can Trust. In Carmit Hazay and Martijn Stam, editors, EUROCRYPT 2023, Part II, volume 14005 of LNCS, pages 405–437. April 2023. Springer, Heidelberg. DOI: 10.1007/978-3-031-30617-4_14
[BDF+25]
Andrea Basso, Pierrick Dartois, Luca De Feo, Antonin Leroux, Luciano Maino, Giacomo Pope, Damien Robert, and Benjamin Wesolowski. SQIsign2D–West. In Kai-Min Chung and Yu Sasaki, editors, Advances in Cryptology – ASIACRYPT 2024, pages 339–370, Singapore. 2025. Springer Nature Singapore. DOI: 10.1007/978-981-96-0891-1_11
[BDK+22]
Ward Beullens, Samuel Dobson, Shuichi Katsumata, Yi-Fu Lai, and Federico Pintore. Group Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient. In Orr Dunkelman and Stefan Dziembowski, editors, EUROCRYPT 2022, Part II, volume 13276 of LNCS, pages 95–126. 2022. Springer, Heidelberg. DOI: 10.1007/978-3-031-07085-3_4
[BFG+22]
Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, and Douglas Stebila. Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake. In Goichiro Hanaoka, Junji Shikata, and Yohei Watanabe, editors, PKC 2022, Part II, volume 13178 of LNCS, pages 3–34. March 2022. Springer, Heidelberg. DOI: 10.1007/978-3-030-97131-1_1
[BGLS03]
Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In Eli Biham, editor, EUROCRYPT 2003, volume 2656 of LNCS, pages 416–432. May 2003. Springer, Heidelberg. DOI: 10.1007/3-540-39200-9_26
[BKP20]
Ward Beullens, Shuichi Katsumata, and Federico Pintore. Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices. In Shiho Moriai and Huaxiong Wang, editors, ASIACRYPT 2020, Part II, volume 12492 of LNCS, pages 464–492. December 2020. Springer, Heidelberg. DOI: 10.1007/978-3-030-64834-3_16
[BKV19]
Ward Beullens, Thorsten Kleinjung, and Frederik Vercauteren. CSI-FiSh: Efficient Isogeny Based Signatures Through Class Group Computations. In Steven D. Galbraith and Shiho Moriai, editors, ASIACRYPT 2019, Part I, volume 11921 of LNCS, pages 227–247. December 2019. Springer, Heidelberg. DOI: 10.1007/978-3-030-34578-5_9
[BPS+23]
Giacomo Borin, Edoardo Persichetti, Paolo Santini, Federico Pintore, and Krijn Reijnders. A Guide to the Design of Digital Signatures based on Cryptographic Group Actions. https://eprint.iacr.org/2023/718. Cryptology ePrint Archive, Paper 2023/718. 2023.
[CD23]
Wouter Castryck and Thomas Decru. An Efficient Key Recovery Attack on SIDH. In Carmit Hazay and Martijn Stam, editors, EUROCRYPT 2023, Part V, volume 14008 of LNCS, pages 423–447. April 2023. Springer, Heidelberg. DOI: 10.1007/978-3-031-30589-4_15
[CDS94]
Ronald Cramer, Ivan Damgård, and Berry Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In Yvo Desmedt, editor, CRYPTO'94, volume 839 of LNCS, pages 174–187. August 1994. Springer, Heidelberg. DOI: 10.1007/3-540-48658-5_19
[CEMR24]
Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, and Krijn Reijnders. AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing. In Marc Joye and Gregor Leander, editors, Advances in Cryptology – EUROCRYPT 2024, Part I, volume 14651 of Lecture Notes in Computer Science, pages 63–93, Zurich, Switzerland. May 26–30, 2024. Springer, Cham, Switzerland. DOI: 10.1007/978-3-031-58716-0_3
[CLL23]
Kelong Cong, Yi-Fu Lai, and Shai Levin. Efficient Isogeny Proofs Using Generic Techniques. In Mehdi Tibouchi and Xiaofeng Wang, editors, ACNS 23, Part II, volume 13906 of LNCS, pages 248–275. June 2023. Springer, Heidelberg. DOI: 10.1007/978-3-031-33491-7_10
[CLM+18]
Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes. CSIDH: An Efficient Post-Quantum Commutative Group Action. In Thomas Peyrin and Steven Galbraith, editors, ASIACRYPT 2018, Part III, volume 11274 of LNCS, pages 395–427. December 2018. Springer, Heidelberg. DOI: 10.1007/978-3-030-03332-3_15
[CLP24]
Mingjie Chen, Antonin Leroux, and Lorenz Panny. SCALLOP-HD: Group Action from 2-Dimensional Isogenies. In Qiang Tang and Vanessa Teague, editors, PKC 2024, Part II, volume 14603 of LNCS, pages 190–216. April 2024. Springer, Heidelberg. DOI: 10.1007/978-3-031-57725-3_7
[CSCRSDF+23]
Jorge Chavez-Saab, Maria Corte-Real Santos, Luca De Feo, Jonathan Komada Eriksen, Basil Hess, David Kohel, Antonin Leroux, Patrick Longa, Michael Meyer, Lorenz Panny, Sikhar Patranabis, Christophe Petit, Francisco Rodríguez Henríquez, Sina Schaeffler, and Benjamin Wesolowski. SQISign Specification. Accessed: 2023-10-04. https://sqisign.org/spec/sqisign-20230601.pdf. 2023.
[DDGZ22]
Luca De Feo, Samuel Dobson, Steven D. Galbraith, and Lukas Zobernig. SIDH Proof of Knowledge. In Shweta Agrawal and Dongdai Lin, editors, ASIACRYPT 2022, Part II, volume 13792 of LNCS, pages 310–339. December 2022. Springer, Heidelberg. DOI: 10.1007/978-3-031-22966-4_11
[DF25]
Max Duparc and Tako Boris Fouotsa. SQIPrime: A Dimension 2 Variant of SQISignHD with Non-smooth Challenge Isogenies. In Kai-Min Chung and Yu Sasaki, editors, Advances in Cryptology – ASIACRYPT 2024, pages 396–429, Singapore. 2025. Springer Nature Singapore. DOI: 10.1007/978-981-96-0891-1_13
[DFK+23]
Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, and Benjamin Wesolowski. SCALLOP: Scaling the CSI-FiSh. In Alexandra Boldyreva and Vladimir Kolesnikov, editors, PKC 2023, Part I, volume 13940 of LNCS, pages 345–375. May 2023. Springer, Heidelberg. DOI: 10.1007/978-3-031-31368-4_13
[DKL+20]
Luca De Feo, David Kohel, Antonin Leroux, Christophe Petit, and Benjamin Wesolowski. SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies. In Shiho Moriai and Huaxiong Wang, editors, ASIACRYPT 2020, Part I, volume 12491 of LNCS, pages 64–93. December 2020. Springer, Heidelberg. DOI: 10.1007/978-3-030-64837-4_3
[DLLW23]
Luca De Feo, Antonin Leroux, Patrick Longa, and Benjamin Wesolowski. New Algorithms for the Deuring Correspondence - Towards Practical and Secure SQISign Signatures. In Carmit Hazay and Martijn Stam, editors, EUROCRYPT 2023, Part V, volume 14008 of LNCS, pages 659–690. April 2023. Springer, Heidelberg. DOI: 10.1007/978-3-031-30589-4_23
[DLRW24]
Pierrick Dartois, Antonin Leroux, Damien Robert, and Benjamin Wesolowski. SQIsignHD: New Dimensions in Cryptography. In Marc Joye and Gregor Leander, editors, EUROCRYPT 2024, Part I, volume 14651 of LNCS, pages 3–32. May 2024. Springer, Heidelberg. DOI: 10.1007/978-3-031-58716-0_1
[DM20]
Luca De Feo and Michael Meyer. Threshold Schemes from Isogeny Assumptions. In Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, and Vassilis Zikas, editors, PKC 2020, Part II, volume 12111 of LNCS, pages 187–212. May 2020. Springer, Heidelberg. DOI: 10.1007/978-3-030-45388-6_7
[EHL+18]
Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter, Travis Morrison, and Christophe Petit. Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and Solutions. In Jesper Buus Nielsen and Vincent Rijmen, editors, EUROCRYPT 2018, Part III, volume 10822 of LNCS, pages 329–368. 2018. Springer, Heidelberg. DOI: 10.1007/978-3-319-78372-7_11
[ESZ22]
Muhammed F. Esgin, Ron Steinfeld, and Raymond K. Zhao. MatRiCT${}^+$: More Efficient Post-Quantum Private Blockchain Payments. In 2022 IEEE Symposium on Security and Privacy, pages 1281–1298. May 2022. IEEE Computer Society Press. DOI: 10.1109/SP46214.2022.9833655
[FJP14]
Luca De Feo, David Jao, and Jérôme Plût. Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Journal of Mathematical Cryptology, 8(3):209–247, 2014. DOI: doi:10.1515/jmc-2012-0015
[FS87]
Amos Fiat and Adi Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In Andrew M. Odlyzko, editor, CRYPTO'86, volume 263 of LNCS, pages 186–194. August 1987. Springer, Heidelberg. DOI: 10.1007/3-540-47721-7_12
[GJK24]
Phillip Gajland, Jonas Janneck, and Eike Kiltz. Ring Signatures for Deniable AKEM: Gandalf's Fellowship. In Leonid Reyzin and Douglas Stebila, editors, Advances in Cryptology – CRYPTO 2024, pages 305–338, Cham. 2024. Springer Nature Switzerland. DOI: 10.1007/978-3-031-68376-3_10
[GK15]
Jens Groth and Markulf Kohlweiss. One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin. In Elisabeth Oswald and Marc Fischlin, editors, EUROCRYPT 2015, Part II, volume 9057 of LNCS, pages 253–280. April 2015. Springer, Heidelberg. DOI: 10.1007/978-3-662-46803-6_9
[GPS17]
Steven D. Galbraith, Christophe Petit, and Javier Silva. Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems. In Tsuyoshi Takagi and Thomas Peyrin, editors, ASIACRYPT 2017, Part I, volume 10624 of LNCS, pages 3–33. December 2017. Springer, Heidelberg. DOI: 10.1007/978-3-319-70694-8_1
[HKKP21]
Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, and Thomas Prest. An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable. In Juan Garay, editor, PKC 2021, Part II, volume 12711 of LNCS, pages 410–440. May 2021. Springer, Heidelberg. DOI: 10.1007/978-3-030-75248-4_15
[KKW18]
Jonathan Katz, Vladimir Kolesnikov, and Xiao Wang. Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures. In David Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang, editors, ACM CCS 2018, pages 525–537. October 2018. ACM Press. DOI: 10.1145/3243734.3243805
[KLLQ23]
Shuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, and Ling Qin. CSI-Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist. In Helena Handschuh and Anna Lysyanskaya, editors, CRYPTO 2023, Part III, volume 14083 of LNCS, pages 729–761. August 2023. Springer, Heidelberg. DOI: 10.1007/978-3-031-38548-3_24
[KLPT14]
David Kohel, Kristin Lauter, Christophe Petit, and Jean-Pierre Tignol. On the quaternion $\ell$-isogeny path problem. LMS Journal of Computation and Mathematics, 17(A):418–432, 2014. DOI: 10.1112/S1461157014000151
[Kup05]
Greg Kuperberg. A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem. SIAM Journal on Computing, 35(1):170-188, 2005. DOI: 10.1137/S0097539703436345
[Kup13]
Greg Kuperberg. Another Subexponential-time Quantum Algorithm for the Dihedral Hidden Subgroup Problem. In Simone Severini and Fernando Brandao, editors, 8th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2013), volume 22 of Leibniz International Proceedings in Informatics (LIPIcs), pages 20–34, Dagstuhl, Germany. 2013. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. DOI: 10.4230/LIPIcs.TQC.2013.20
[Lai24]
Yi-Fu Lai. Capybara and Tsubaki: Verifiable Random Functions from Group Actions and Isogenies. IACR Communications in Cryptology, 1(3), 2024. DOI: 10.62056/avr-11zn4
[LAZ19]
Xingye Lu, Man Ho Au, and Zhenfei Zhang. Raptor: A Practical Lattice-Based (Linkable) Ring Signature. In Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, and Moti Yung, editors, ACNS 19, volume 11464 of LNCS, pages 110–130. June 2019. Springer, Heidelberg. DOI: 10.1007/978-3-030-21568-2_6
[Ler22]
Antonin Leroux. Quaternion Algebra and isogeny-based cryptography. PhD thesis, PhD thesis, Ecole doctorale de l’Institut Polytechnique de Paris, 2022.
[Ler23]
Antonin Leroux. Verifiable random function from the Deuring correspondence and higher dimensional isogenies. Cryptology ePrint Archive, Paper 2023/1251. 2023.
[LGD21]
Yi-Fu Lai, Steven D. Galbraith, and Cyprien Delpech de Saint Guilhem. Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer. In Anne Canteaut and François-Xavier Standaert, editors, EUROCRYPT 2021, Part I, volume 12696 of LNCS, pages 213–241. October 2021. Springer, Heidelberg. DOI: 10.1007/978-3-030-77870-5_8
[LNS21]
Vadim Lyubashevsky, Ngoc Khanh Nguyen, and Gregor Seiler. SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions. In Tal Malkin and Chris Peikert, editors, CRYPTO 2021, Part II, volume 12826 of LNCS, pages 611–640, Virtual Event. August 2021. Springer, Heidelberg. DOI: 10.1007/978-3-030-84245-1_21
[LWW04]
Joseph K. Liu, Victor K. Wei, and Duncan S. Wong. Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). In Huaxiong Wang, Josef Pieprzyk, and Vijay Varadharajan, editors, ACISP 04, volume 3108 of LNCS, pages 325–335. July 2004. Springer, Heidelberg. DOI: 10.1007/978-3-540-27800-9_28
[Mer88]
Ralph C. Merkle. A Digital Signature Based on a Conventional Encryption Function. In Carl Pomerance, editor, CRYPTO'87, volume 293 of LNCS, pages 369–378. August 1988. Springer, Heidelberg. DOI: 10.1007/3-540-48184-2_32
[MMP+23]
Luciano Maino, Chloe Martindale, Lorenz Panny, Giacomo Pope, and Benjamin Wesolowski. A Direct Key Recovery Attack on SIDH. In Carmit Hazay and Martijn Stam, editors, EUROCRYPT 2023, Part V, volume 14008 of LNCS, pages 448–471. April 2023. Springer, Heidelberg. DOI: 10.1007/978-3-031-30589-4_16
[NOC+25]
Kohei Nakagawa, Hiroshi Onuki, Wouter Castryck, Mingjie Chen, Riccardo Invernizzi, Gioella Lorenzon, and Frederik Vercauteren. SQIsign2D-East: A New Signature Scheme Using 2-Dimensional Isogenies. In Kai-Min Chung and Yu Sasaki, editors, Advances in Cryptology – ASIACRYPT 2024, pages 272–303, Singapore. 2025. Springer Nature Singapore. DOI: 10.1007/978-981-96-0891-1_9
[Noe15]
Shen Noether. Ring Signature Confidential Transactions for Monero. https://eprint.iacr.org/2015/1098. Cryptology ePrint Archive, Report 2015/1098. 2015.
[NS04]
Phong Q. Nguyen and Damien Stehlé. Low-Dimensional Lattice Basis Reduction Revisited. In Duncan Buell, editor, Algorithmic Number Theory, pages 338–357, Berlin, Heidelberg. 2004. Springer Berlin Heidelberg. DOI: 10.1007/978-3-540-24847-7_26
[ON25]
Hiroshi Onuki and Kohei Nakagawa. Ideal-to-Isogeny Algorithm Using 2-Dimensional Isogenies and Its Application to SQIsign. In Kai-Min Chung and Yu Sasaki, editors, Advances in Cryptology – ASIACRYPT 2024, pages 243–271, Singapore. 2025. Springer Nature Singapore. DOI: doi.org/10.1007/978-981-96-0891-1_8
[Pei20]
Chris Peikert. He Gives C-Sieves on the CSIDH. In Anne Canteaut and Yuval Ishai, editors, EUROCRYPT 2020, Part II, volume 12106 of LNCS, pages 463–492. May 2020. Springer, Heidelberg. DOI: 10.1007/978-3-030-45724-2_16
[PW24]
Aurel Page and Benjamin Wesolowski. The Supersingular Endomorphism Ring and One Endomorphism Problems are Equivalent. In Marc Joye and Gregor Leander, editors, EUROCRYPT 2024, Part VI, volume 14656 of LNCS, pages 388–417. May 2024. Springer, Heidelberg. DOI: 10.1007/978-3-031-58751-1_14
[RK24]
Farzin Renan and Péter Kutas. SQIAsignHD: SQIsignHD Adaptor Signature. https://eprint.iacr.org/2024/561. Cryptology ePrint Archive, Paper 2024/561. 2024.
[Rob23]
Damien Robert. Breaking SIDH in Polynomial Time. In Carmit Hazay and Martijn Stam, editors, EUROCRYPT 2023, Part V, volume 14008 of LNCS, pages 472–503. April 2023. Springer, Heidelberg. DOI: 10.1007/978-3-031-30589-4_17
[RST01]
Ronald L. Rivest, Adi Shamir, and Yael Tauman. How to Leak a Secret. In Colin Boyd, editor, ASIACRYPT 2001, volume 2248 of LNCS, pages 552–565. December 2001. Springer, Heidelberg. DOI: 10.1007/3-540-45682-1_32
[Sho94]
P.W. Shor. Algorithms for quantum computation: discrete logarithms and factoring. In Proceedings 35th Annual Symposium on Foundations of Computer Science, pages 124-134. 1994. DOI: 10.1109/SFCS.1994.365700
[Sil09]
Joseph H. Silverman. The Arithmetic of Elliptic Curves, volume 106 of Graduate Texts in Mathematics. Graduate Texts in Mathematics. Springer New York, NY, 2 edition. 2009. DOI: 10.1007/978-0-387-09494-6
[UJ20]
David Urbanik and David Jao. New Techniques for SIDH-based NIKE. Journal of Mathematical Cryptology, 14(1):120–128, 2020. DOI: doi:10.1515/jmc-2015-0056
[vdC35]
J van der Corput. Verallgemeinerung einer mordellschen Beweismethode in der Geometrie der Zahlen. Acta Arithmetica, 1(1):62–66, 1935.
[Voi21]
John Voight. Quaternion Algebras, volume 288 of Graduate Texts in Mathematics. Graduate Texts in Mathematics. Springer Cham, 1 edition. 2021. DOI: 10.1007/978-3-030-56694-4
[Wes22]
Benjamin Wesolowski. The supersingular isogeny path and endomorphism ring problems are equivalent. In 62nd FOCS, pages 1100–1111. February 2022. IEEE Computer Society Press. DOI: 10.1109/FOCS52979.2021.00109
[YAJ+17]
Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, and Vladimir Soukharev. A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies. In Aggelos Kiayias, editor, FC 2017, volume 10322 of LNCS, pages 163–181. April 2017. Springer, Heidelberg. DOI: 10.1007/978-3-319-70972-7_9
[YEL+21]
Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, and Zhimin Ding. DualRing: Generic Construction of Ring Signatures with Efficient Instantiations. In Tal Malkin and Chris Peikert, editors, CRYPTO 2021, Part I, volume 12825 of LNCS, pages 251–281, Virtual Event. August 2021. Springer, Heidelberg. DOI: 10.1007/978-3-030-84242-0_10
[YSL+20]
Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, and Dawu Gu. RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. In Joseph Bonneau and Nadia Heninger, editors, FC 2020, volume 12059 of LNCS, pages 464–483. February 2020. Springer, Heidelberg. DOI: 10.1007/978-3-030-51280-4_25

PDFPDF Open access

History
Submitted: 2024-07-09
Accepted: 2024-12-03
Published: 2025-01-13
How to cite

Giacomo Borin, Yi-Fu Lai, and Antonin Leroux, Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies. IACR Communications in Cryptology, vol. 1, no. 4, Jan 13, 2025, doi: 10.62056/ava3zivrzn.

License

Copyright is held by the author(s)

This work is licensed under a Creative Commons Attribution (CC BY) license.