Practical Lattice-Based Digital Signature Schemes

Author:

Howe James1,Pöppelmann Thomas2,O'neill Máire1,O'sullivan Elizabeth1,Güneysu Tim2

Affiliation:

1. Centre for Secure Information Technologies (CSIT), Queen's University Belfast, UK

2. Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Bochum, Germany

Abstract

Digital signatures are an important primitive for building secure systems and are used in most real-world security protocols. However, almost all popular signature schemes are either based on the factoring assumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case of classical cryptanalytic advances or progress on the development of quantum computers, the hardness of these closely related problems might be seriously weakened. A potential alternative approach is the construction of signature schemes based on the hardness of certain lattice problems that are assumed to be intractable by quantum computers. Due to significant research advancements in recent years, lattice-based schemes have now become practical and appear to be a very viable alternative to number-theoretic cryptography. In this article, we focus on recent developments and the current state of the art in lattice-based digital signatures and provide a comprehensive survey discussing signature schemes with respect to practicality. Additionally, we discuss future research areas that are essential for the continued development of lattice-based cryptography.

Funder

DFG Research Training Group GRK 1817/1

the German Research Foundation

European Union H2020 SAFEcrypto project

Publisher

Association for Computing Machinery (ACM)

Subject

Hardware and Architecture,Software

Reference103 articles.

1. Michel Abdalla Jee Hea An Mihir Bellare and Chanathip Namprempre. 2002. From identification to signatures via the fiat-shamir transform: Minimizing assumptions for security and forward-security. In EUROCRYPT. 418--433. Michel Abdalla Jee Hea An Mihir Bellare and Chanathip Namprempre. 2002. From identification to signatures via the fiat-shamir transform: Minimizing assumptions for security and forward-security. In EUROCRYPT. 418--433.

2. Michel Abdalla Pierre-Alain Fouque Vadim Lyubashevsky and Mehdi Tibouchi. 2012. Tightly-secure signatures from lossy identification schemes. In EUROCRYPT. 572--590. 10.1007/978-3-642-29011-4_34 Michel Abdalla Pierre-Alain Fouque Vadim Lyubashevsky and Mehdi Tibouchi. 2012. Tightly-secure signatures from lossy identification schemes. In EUROCRYPT. 572--590. 10.1007/978-3-642-29011-4_34

3. Shweta Agrawal Dan Boneh and Xavier Boyen. 2010. Efficient lattice (H)IBE in the standard model. In EUROCRYPT. 553--572. 10.1007/978-3-642-13190-5_28 Shweta Agrawal Dan Boneh and Xavier Boyen. 2010. Efficient lattice (H)IBE in the standard model. In EUROCRYPT. 553--572. 10.1007/978-3-642-13190-5_28

4. Miklós Ajtai. 1996. Generating hard instances of lattice problems (extended abstract). In STOC. 99--108. 10.1145/237814.237838 Miklós Ajtai. 1996. Generating hard instances of lattice problems (extended abstract). In STOC. 99--108. 10.1145/237814.237838

5. Miklós Ajtai Ravi Kumar and D. Sivakumar. 2001. A sieve algorithm for the shortest lattice vector problem. In STOC. 601--610. 10.1145/380752.380857 Miklós Ajtai Ravi Kumar and D. Sivakumar. 2001. A sieve algorithm for the shortest lattice vector problem. In STOC. 601--610. 10.1145/380752.380857

Cited by 33 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Exploring the fusion of lattice‐based quantum key distribution for secure Internet of Things communications;IET Quantum Communication;2024-07-23

2. Cryptography using the Internet of Things;Intelligent Technologies for Automated Electronic Systems;2024-03-04

3. Fortifying Blockchain: Streamlined Lattice Signatures Amid Quantum Threats to Blockchain;2024 5th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI);2024-01-18

4. A New Random Sampling Method and Its Application in Improving Progressive BKZ Algorithm;Journal of Systems Science and Complexity;2023-10-25

5. 14 Code-based post-quantum cryptographic technique: digital signature;Quantum-Safe Cryptography Algorithms and Approaches;2023-07-24

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3