Affiliation:
1. Information Security Laboratory, Institute of Information and Computational Technologies, Almaty 050010, Kazakhstan
2. Institute of Automation and Information Technologies, Satbayev University, Almaty 050013, Kazakhstan
Abstract
This paper proposes a new post-quantum signature scheme, Syrga2, based on hash functions. As known, existing post-quantum algorithms are classified based on their structures. The proposed Syrga2 scheme belongs to the class of multi-use signatures with state retention. A distinctive feature of state-retaining signatures is achieving a compromise between performance and signature size. This scheme enables the creation of a secure signature for r messages using a single pair of secret and public keys. The strength of signature algorithms based on hash functions depends on the properties of the hash function used in their structure. Additionally, for such algorithms, it is possible to specify the security level precisely. In the proposed scheme, the HBC-256 algorithm developed at the Institute of Information and Computational Technologies (IICT) is used as the hash function. The security of the HBC-256 algorithm has been thoroughly studied in other works by the authors. In contrast to the Syrga1 scheme presented in previous works by the authors, the Syrga2 scheme provides for the definition of different security levels determined by the parameter τ. This paper experimentally demonstrates the impossibility of breaking the proposed scheme using a chosen-plaintext attack. Additionally, the scheme’s performance is evaluated for signature creation, signing, and message verification.
Funder
Ministry of Science and Higher Education of Kazakhstan
Reference28 articles.
1. Li, S., Chen, Y., Chen, L., Liao, J., Kuang, C., Li, K., Liang, W., and Xiong, N. (2023). Post-Quantum Security: Opportunities and Challenges. Sensors, 23.
2. Post-Quantum Cryptosystems: Open Problems and Solutions. Lattice-Based Cryptosystems;Malygina;J. Appl. Ind. Math.,2023
3. Post-quantum signature schemes for efficient hardware implementation;Moldovyan;Microprocess. Microsyst.,2021
4. On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions;Suhail;IEEE Internet Things J.,2021
5. Post-quantum cryptography Algorithm’s standardization and performance analysis;Kumar;Array,2022