SPDH-Sign: Towards Efficient, Post-quantum Group-Based Signatures

نویسندگان

چکیده

In this paper, we present a new diverse class of post-quantum group-based Digital Signature Schemes (DSS). The approach is significantly different from previous examples digital signatures and adopts the framework group action-based cryptography: show that each finite defines action relative to semidirect product by its automorphism group, give security bounds on resulting signature scheme in terms group-theoretic computational problem known as Semidirect Discrete Logarithm Problem (SDLP). Crucially, make progress towards being able efficiently compute novel action, an example parameterised family groups for which can be computed any parameters, thereby negating need expensive offline computation or inclusion redundancy required other schemes type.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Post-Quantum Group Signatures from Symmetric Primitives

Group signatures are used extensively for privacy in anonymous credentials schemes and in real-world systems for hardware enclave attestation. As such, there is a strong interest in making these schemes post-quantum secure. In this paper we initiate the study of group signature schemes built only from symmetric primitives, such as hash functions and PRFs, widely regarded as the safest primitive...

متن کامل

Post-quantum Cryptography: Code-Based Signatures

This survey provides a comparative overview of code-based signature schemes with respect to security and performance. Furthermore, we explicitly describe serveral code-based signature schemes with additional properties such as identity-based, threshold ring and blind signatures.

متن کامل

Post-Quantum Signatures

Digital signatures have become a key technology for making the Internet and other IT infrastructures secure. But in 1994 Peter Shor showed that quantum computers can break all digital signature schemes that are used today and in 2001 Chuang and his coworkers implemented Shor’s algorithm for the first time on a 7-qubit NMR quantum computer. This paper studies the question: What kind of digital s...

متن کامل

Post-quantum signatures for today

Digital signatures are essential for the security of computer networks such as the Internet. For example, digital signatures are widely used to ensure the authenticity and integrity of updates for operating systems and other software applications. The security of the few practically used signature schemes is threatened by quantum computers. When large quantum computers are built, all currently ...

متن کامل

Efficient Group Signatures without Trapdoors

Group signature schemes enable unlinkably anonymous authentication, in the same fashion that digital signatures provide the basis for strong authentication protocols. This paper introduces the first group signature scheme with constant-size parameters that does not require any group member, including group managers, to know trapdoor secrets. This novel type of group signature scheme allows publ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2023

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-40003-2_5