doi: 10.17586/2226-1494-2026-26-2-442-445


Oblivious signature based on the theory of elliptic curve isogeny 

A. F. Khutsaeva


Read the full article  ';
Article in Russian

For citation:
Khutsaeva A.F. Oblivious signature based on the theory of elliptic curve isogeny. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2026, vol. 26, no. 2, pp. 442–445 (in Russian). doi: 10.17586/2226-1494-2026-26-2-442-445


Abstract
This paper presents a novel 1-out-of-n post-quantum oblivious signature scheme based on supersingular elliptic curve isogenies. The proposed scheme is built upon the Commutative Supersingular Isogeny based Fiat-Shamir scheme whose security relies on the hardness assumption of the multiple-target group action inverse problem. This approach ensures resistance against attacks using Shor’s algorithm. The key generation algorithm, the interactive signing protocol, and the verification algorithm are formalized. Experimental evaluation in SageMath demonstrates more than a threefold reduction in communication overhead compared to a lattice-based counterpart.

Keywords: oblivious signature, post-quantum cryptography, isogenies of elliptic curves, digital signature, MT-GAIP, CSI-FiSh

Acknowledgements. This research was funded by the State Assignment grant number FSER-2025-0003. The author is grateful to S.V. Bezzateev for scientific supervision and valuable advice. The author also wishes to thank the anonymous reviewer and the editor for their constructive criticism which helped improve this paper.

References
1. Khutsaeva A., Leevik A., Bezzateev S. A Survey of post-quantum oblivious protocols. Cryptography, 2025, vol. 9, no. 4, pp. 62. https://doi.org/10.3390/cryptography9040062
2. Rivest R.L., Shamir A., Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, vol. 21, no. 2, pp. 120–126. https://doi.org/10.1145/359340.359342
3. Chen L. Oblivious signatures. Lecture Notes in Computer Science, 1994, vol. 875, pp. 161–172. https://doi.org/10.1007/3-540-58618-0_62
4. Tso R., Okamoto T., Okamoto E. 1-out-of-n oblivious signatures. Lecture Notes in Computer Science, 2008, vol. 4991, pp. 45–55. https://doi.org/10.1007/978-3-540-79104-1_4
5. Tso R. Two-in-one oblivious signatures. Future Generation Computer Systems, 2019, vol. 101, pp. 467–475. https://doi.org/10.1016/j.future.2019.06.014
6. Shor P.W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Review, 1999, vol. 41, no. 2, pp. 303–332. https://doi.org/10.1137/s0036144598347011
7. You J.-S., Liu Z.-Y., Tso R., Tseng Y.-F., Mambo M. Quantum-resistant 1-out-of-n oblivious signatures from lattices. Lecture Notes in Computer Science, 2022, vol. 13504, pp. 166–186. https://doi.org/10.1007/978-3-031-15255-9_9
8. Khutsaeva A.F., Davydov V.V., Bezzateev S.V. Oblivious signature scheme based on isogenies of supersingular elliptic curves. Information Security Problems. Computer Systems, 2023, no. 4 (57), pp. 116–121. (in Russian). https://doi.org/10.48612/jisp/2m49-vg37-99pt
9. Beullens W., Kleinjung T., Vercauteren F. CSI-FiSh: efficient isogeny based signatures through class group computations. Lecture Notes in Computer Science, 2019, vol. 11921, pp. 227–247. https://doi.org/10.1007/978-3-030-34578-5_9
10. Castryck W., Lange T., Martindale C., Panny L., Renes J. CSIDH: an efficient post-quantum commutative group action. Lecture Notes in Computer Science, 2018, vol. 11274, pp. 395–427. https://doi.org/10.1007/978-3-030-03332-3_15


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2026 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.

Яндекс.Метрика