Improving the CSIDH Protocol for Multi-party Cryptography: Rigorous Mathematical Analysis, Efficiency, and Security Comparison

Journal Title: Engineering and Technology Journal - Year 2024, Vol 9, Issue 10

Abstract

This paper introduces a novel Distributed Key Generation (DKG) protocol based on the Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) framework for secure multi-party cryptography. Our proposed protocol is designed to address scalability and security concerns, particularly in post-quantum cryptographic systems. The main contributions include the introduction of Piecewise Verifiable Proofs (PVPs) for non-interactive zero-knowledge verification of secret shares, and the provision of rigorous security analysis, including resistance to quantum adversaries via Shor’s and Grover’s algorithms. We analyze the protocol’s efficiency, ensuring low computational overhead even in large-scale systems, and compare it with other distributed cryptographic protocols such as RSA-based and lattice-based schemes. Through mathematical proofs and complexity analysis, we demonstrate that our protocol offers enhanced security, efficiency, and scalability in a post-quantum environment. The results presented in this paper provide a strong foundation for implementing secure multi-party computations in quantum-resistant systems.

Authors and Affiliations

Mohammed El Baraka, Siham Ezzouak,

Keywords

Related Articles

INVESTIGATION DYNAMIC PROPERTIES OF SOIL (THE DAMPING RATIO AND SHEAR MODULUS) FOR RESISTANCE DESIGN AT THE LNG BAC LIEU GAS PIPELINE PROJECT BY CYCLIC TRIAXIAL TEST

The LNG Bac Lieu gas pipeline project is part of the 3.200MW LNG power plant complex in Bac Lieu province. The entire pipeline will be designed underground at the sea floor to be directly subjected to dynamic loads (eart...

Control the Speed of Separately Excited Dc Motor Using Sliding Mode Controller

This study looks into how a Sliding Mode Controller (SMC) can be used to control a Separately Excited DC Motor's (SEDCM) speed. The SMC is utilized to improve the system's resilience to unknowns and disruptions, guarante...

A Special Equation between Visual Lightness and the Luxurious Impression of Interior Architecture through the New Classic

This research examines the application of the new classic contemporary style in interior architecture, focusing on achieving luxury and visual lightness. The study highlights the historical evolution of the new classic s...

BIOMETRIC ACCESS CONTROL USING VOICE AND FINGERPRINT

In security-related systems, such as access control systems, authentication is extremely important. There are several ways to carry out this crucial activity, but biometrics is currently attracting more attention. After...

Assessment of the Implementation of Flipped Classroom Setup in DIFEQUATIONS at Holy Angel University – School of Engineering and Architecture

Flipped classroom is an interactive teaching approach which provides active learning. In the first semester of school year 2023-2024, flipped classroom was implemented in DIFEQUATIONS under the School of Engineering and...

Download PDF file
  • EP ID EP750224
  • DOI 10.47191/etj/v9i10.31
  • Views 32
  • Downloads 0

How To Cite

Mohammed El Baraka, Siham Ezzouak, (2024). Improving the CSIDH Protocol for Multi-party Cryptography: Rigorous Mathematical Analysis, Efficiency, and Security Comparison. Engineering and Technology Journal, 9(10), -. https://europub.co.uk/articles/-A-750224