SPDH-Sign: Towards Efficient, Post-quantum Group-Based Signatures
نویسندگان
چکیده
In this paper, we present a new diverse class of post-quantum group-based Digital Signature Schemes (DSS). The approach is significantly different from previous examples digital signatures and adopts the framework group action-based cryptography: show that each finite defines action relative to semidirect product by its automorphism group, give security bounds on resulting signature scheme in terms group-theoretic computational problem known as Semidirect Discrete Logarithm Problem (SDLP). Crucially, make progress towards being able efficiently compute novel action, an example parameterised family groups for which can be computed any parameters, thereby negating need expensive offline computation or inclusion redundancy required other schemes type.
منابع مشابه
Post-Quantum Group Signatures from Symmetric Primitives
Group signatures are used extensively for privacy in anonymous credentials schemes and in real-world systems for hardware enclave attestation. As such, there is a strong interest in making these schemes post-quantum secure. In this paper we initiate the study of group signature schemes built only from symmetric primitives, such as hash functions and PRFs, widely regarded as the safest primitive...
متن کاملPost-quantum Cryptography: Code-Based Signatures
This survey provides a comparative overview of code-based signature schemes with respect to security and performance. Furthermore, we explicitly describe serveral code-based signature schemes with additional properties such as identity-based, threshold ring and blind signatures.
متن کاملPost-Quantum Signatures
Digital signatures have become a key technology for making the Internet and other IT infrastructures secure. But in 1994 Peter Shor showed that quantum computers can break all digital signature schemes that are used today and in 2001 Chuang and his coworkers implemented Shor’s algorithm for the first time on a 7-qubit NMR quantum computer. This paper studies the question: What kind of digital s...
متن کاملPost-quantum signatures for today
Digital signatures are essential for the security of computer networks such as the Internet. For example, digital signatures are widely used to ensure the authenticity and integrity of updates for operating systems and other software applications. The security of the few practically used signature schemes is threatened by quantum computers. When large quantum computers are built, all currently ...
متن کاملEfficient Group Signatures without Trapdoors
Group signature schemes enable unlinkably anonymous authentication, in the same fashion that digital signatures provide the basis for strong authentication protocols. This paper introduces the first group signature scheme with constant-size parameters that does not require any group member, including group managers, to know trapdoor secrets. This novel type of group signature scheme allows publ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2023
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-031-40003-2_5