Affiliation:
1. Institute of Information and Computational Technologies, Almaty 050010, Kazakhstan
Abstract
The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used. This means that if the scheme is compromised, then one of these properties will be violated. It is important to note that the properties of cryptographic hash functions have been studied for many years, but if a specific hash function used in a protocol turns out to be insecure, it can simply be replaced with another one while keeping the overall construction unchanged. This article describes a new post-quantum signature algorithm, Syrga-1, based on a hash function. This algorithm is designed to sign r messages with a single secret key. One of the key primitives of the signature algorithm is a cryptographic hash function. The proposed algorithm uses the HAS01 hashing algorithm developed by researchers from the Information Security Laboratory of the Institute of Information and Computational Technologies. The security and efficiency of the specified hash algorithm have been demonstrated in other articles by its authors. Hash-based signature schemes are attractive as post-quantum signature schemes because their security can be quantified, and their security has been proven.
Funder
Ministry of Science and Higher Education of Kazakhstan
Reference26 articles.
1. Mosca, M. (2014). Post-Quantum Cryptography. PQCrypto 2014. Lecture Notes in Computer Science, Springer.
2. Bernstein, D.J., Buchmann, J., and Dahmen, E. (2009). Post-Quantum Cryptography, Springer.
3. Begimbayeva, Y., Zhaxalykov, T., and Ussatova, O. (2023, January 14–22). Investigation of Strength of E91 Quantum Key Distribution Protocol. Proceedings of the 19th International Asian School-Seminar on Optimization Problems of Complex Systems (OPCS), Novosibirsk, Moscow, Russia.
4. A Review of the Present Cryptographic Arsenal to Deal with Post-Quantum Threats;Yalamuri;Procedia Comput. Sci.,2022
5. Post-quantum lattice-based cryptography implementations;Nejatollahi;ACM Comput. Surv.,2022
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献