Outline. We shall begin in Section 2 by reviewing the existing X3DH protocol used as Signal’s initial key agreement. We will then review the supersingular isogeny ▇▇▇▇▇▇-▇▇▇▇▇▇▇ key exchange (SIDH) in Section 3. In Section 4 we shall discuss the security properties of an appropriate Signal key agreement protocol in more detail and define a security model to be used. This is followed by our construction of a new protocol in Section 5 using SIDH, which we propose is an efficient post-quantum replacement for X3DH. Section 6 gives a proof of security for this construction, and Section 7 discusses the efficiency of our protocol and the key differences between our proposal and the original X3DH scheme.
Appears in 2 contracts
Sources: Post Quantum Signal Key Agreement With Sidh, Post Quantum Signal Key Agreement With Sidh
Outline. We shall begin in Section 2 by reviewing the existing X3DH protocol used as Signal’s initial key agreement. We will then review the supersingular isogeny ▇▇▇▇▇▇-Diffie–▇▇▇▇▇▇▇ key exchange (SIDH) in Section 3. In Section 4 we shall discuss the security properties of an appropriate Signal key agreement protocol in more detail and define a security model to be used. This is followed by our construction of a new protocol in Section 5 using SIDH, which we propose is an efficient post-quantum replacement for X3DH. Section 6 gives a proof of security for this construction, and Section 7 discusses the efficiency of our protocol and the key differences between our proposal and the original X3DH scheme.
Appears in 1 contract