A Post-Quantum Digital Signature Using Verkle Trees and Lattices
Author:
Iavich Maksim1ORCID, Kuchukhidze Tamari2, Bocu Razvan3ORCID
Affiliation:
1. Department of Computer Science, Caucasus University, Tbilisi 0102, Georgia 2. Department of Computer Science, International Black Sea University, Tbilisi 0131, Georgia 3. Department of Mathematics and Computer Science, Transilvania University of Brasov, 500036 Brasov, Romania
Abstract
Research on quantum computers has advanced significantly in recent years. If humanity ever creates an effective quantum computer, many of the present public key cryptosystems can be compromised. These cryptosystems are currently found in many commercial products. We have devised solutions that seem to protect us from quantum attacks, but they are unsafe and inefficient for use in everyday life. In the paper, hash-based digital signature techniques are analyzed. A Merkle-tree-based digital signature is assessed. Using a Verkle tree and vector commitments, the paper explores novel ideas. The authors of this article present a unique technology for developing a post-quantum digital signature system using state-of-the-art Verkle tree technology. A Verkle tree, vector commitments, and vector commitments based on lattices for post-quantum features are used for this purpose. The concepts of post-quantum signature design utilizing a Verkle tree are also provided in the paper.
Funder
Shota Rustaveli National Science Foundation of Georgia
Subject
Physics and Astronomy (miscellaneous),General Mathematics,Chemistry (miscellaneous),Computer Science (miscellaneous)
Reference16 articles.
1. Chen, L., Chen, L., Jordan, S., Liu, Y.K., Moody, D., Peralta, R., Perlner, R.A., and Smith-Tone, D. (2016). Report on Post-Quantum Cryptography, US Department of Commerce, National Institute of Standards and Technology. 2. Bernstein, D.J., Buchmann, J., and Dahmen, E. (2009). Post-Quantum Cryptography, Springer. 3. Bhaskar, B., and Sendrier, N. (2008). Post-Quantum Cryptography, Proceedings of the Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, 17–19 October 2008, Springer. Proceedings 2. 4. Yin, X., He, J., Guo, Y., Han, D., Li, K.-C., and Castiglione, A. (2020). An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree. Sensors, 20. 5. Chen, Y.-C., Chou, Y.-P., and Chou, Y.-C. (2019). An Image Authentication Scheme Using Merkle Tree Mechanisms. Future Internet, 11.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|