Score: 0

CSI-IBBS: Identity-Based Blind Signature using CSIDH

Published: September 7, 2025 | arXiv ID: 2509.06127v1

By: Soumya Bhoumik , Sarbari Mitra , Rohit Raj Sharma and more

Potential Business Impact:

Keeps secrets safe from future super-computers.

Business Areas:
E-Signature Information Technology, Privacy and Security

Identity-based cryptography (IBC), proposed by Adi Shamir, revolutionized public key authentication by eliminating the need for certificates, enabling a more efficient and scalable approach to cryptographic systems. Meanwhile, in \cite{Katsumata2024group}, Katsumata et al. were the first to present the blind signature protocol based on the hardness assumption of isogeny with provable security, which resembles the Schnorr blind signature. Building upon these foundational concepts, we propose an Identity-Based Blind Signature Scheme with an Honest Zero-Knowledge Verifier utilizing the CSIDH framework. This scheme combines blind signatures for privacy preservation with zero-knowledge proofs to ensure the verifier's honesty without revealing any additional information. Leveraging the quantum-resistant properties of CSIDH, a post-quantum secure scheme based on supersingular isogenies, our scheme offers strong protection against quantum adversaries while maintaining computational efficiency. We analyze the security of the introduced protocol in the standard cryptographic model and demonstrate its effectiveness in safeguarding privacy and verifier honesty. Furthermore, we present a performance evaluation, confirming the practical viability of this quantum-resistant cryptographic solution for privacy-preserving applications. This work advances the creation of secure, and scalable cryptographic systems for the post-quantum era.

Country of Origin
πŸ‡ΊπŸ‡Έ United States

Page Count
24 pages

Category
Computer Science:
Cryptography and Security