Improving the CSIDH Protocol for Multi-party Cryptography: Rigorous Mathematical Analysis, Efficiency, and Security Comparison

Journal Title: Engineering and Technology Journal - Year 2024, Vol 9, Issue 10

Abstract

This paper introduces a novel Distributed Key Generation (DKG) protocol based on the Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) framework for secure multi-party cryptography. Our proposed protocol is designed to address scalability and security concerns, particularly in post-quantum cryptographic systems. The main contributions include the introduction of Piecewise Verifiable Proofs (PVPs) for non-interactive zero-knowledge verification of secret shares, and the provision of rigorous security analysis, including resistance to quantum adversaries via Shor’s and Grover’s algorithms. We analyze the protocol’s efficiency, ensuring low computational overhead even in large-scale systems, and compare it with other distributed cryptographic protocols such as RSA-based and lattice-based schemes. Through mathematical proofs and complexity analysis, we demonstrate that our protocol offers enhanced security, efficiency, and scalability in a post-quantum environment. The results presented in this paper provide a strong foundation for implementing secure multi-party computations in quantum-resistant systems.

Authors and Affiliations

Mohammed El Baraka, Siham Ezzouak,

Keywords

Related Articles

Optimization of Road Section and Signalized Intersection Performance Using PKJI 2023 at Dewi Sartika-Raya Kalibata Intersection

As time goes by, population growth and the need for transportation will increase. The increase in the number of vehicles on the road that is not accompanied by improvements in transportation infrastructure such as roads...

Enhancing Domestic Wastewater Treatment: A Study on the Efficacy of Tiered Filtration and a Combined Photocatalytic Ozonation Methods

This study aimed to construct an optimized reactor using photocatalytic ozonation, and its effectiveness was determined using PermenLHK No. 86/2016. The Tanjung Uma housing estate in Batam city was selected as the study...

Emotion Detection Using Deep Learning Algorithm

Automatic emotion detection is a key task in human machine interaction,where emotion detection makes system more natural. In this paper, we propose an emotion detection using deep learning algorithm. The proposed algorit...

The Extraction of Alcea Rosea Organic Dye and Its Characterization of Optical Properties

In the present study, the optical properties of a natural dye extracted from Alcea rosea flowers were investigated. The color extraction procedure was performed using a nontoxic solvent ethanol to enhance human safety an...

Design and Construction of A Non-Contact Thermometer with Environmental Calibration for Health Monitoring

Fever is a common symptom of many infections, keeping monitoring devices like thermometers in constant demand. Temperature is an important vital sign for assessing acutely unwell individuals, and is measured frequently i...

Download PDF file
  • EP ID EP750224
  • DOI 10.47191/etj/v9i10.31
  • Views 54
  • Downloads 0

How To Cite

Mohammed El Baraka, Siham Ezzouak, (2024). Improving the CSIDH Protocol for Multi-party Cryptography: Rigorous Mathematical Analysis, Efficiency, and Security Comparison. Engineering and Technology Journal, 9(10), -. https://www.europub.co.uk/articles/-A-750224