Browse > Article
http://dx.doi.org/10.13089/JKIISC.2021.31.3.517

A Post-Quantum Multi-Signature Scheme  

Ko, Chanyoung (Korea University)
Lee, Youngkyung (Korea University)
Lee, Kwangsu (Sejong University)
Park, Jong Hwan (Sangmyung University)
Abstract
Recently, the acceleration of the development of quantum computers has raised the issue of the safety of factorization and discrete logarithm based digital signature schemes used in existing Internet environments. To solve the issue, several digital signature schemes are presented that are safe in post-quantum computing environments, including standardization work by the National Institute of Standards and Technology(NIST). In this paper, we design and present a multi-signature scheme based on the TACHYON announced by Behnia et al. in 2018 CCS conference, and prove the security. Multi-signature schemes are key techniques that can distribute the dependence of cryptocurrency-wallet on private keys in the cryptocurrency field, which has recently received much attention as an digital signature application, and many researchers and developers have recently been interested. The multi-signature scheme presented in this paper enables public key aggregation in a plain public key model, which does not require additional zero-knowledge proof, and can construct an effective scheme with only an aggregated public key.
Keywords
Post-quantum; multi-signature; key aggregation; generalized compact knapsack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 I. Damgard, C. Orlandi, A. Takahashi and M. Tibouchi. "Two-round n-out-of-n and multi-signatures and trapdoor commitment from lattices," Cryptology ePrint Archive, Report 2020/1110, Sep. 2020.
2 Z.Y. Liu, Y.F. Tseng, and R. Tso. "Cryptanalysis of a round optimal lattice-based multisignature scheme." Cryptology ePrint Archive, Report 2020/1172, Sep. 2020.
3 M. Fukumitsu and S. Hasegawa. "A tightly-secure lattice-based multisignature," Proceedings of the 6th on ASIA Public-Key Cryptography Workshop, pp. 3-11, Jul. 2019.
4 I. Dinur and N. Nadler, "Multi-Target Attacks on the Picnic Signature Scheme and Related Protocols," Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 699-727, Springer, Cham, May. 2019.
5 N. Bindel, S. Akleylek, E. Alkim, P. S. L. M. Barreto, J. Buchmann, E. Eaton, G. Gutoski, J. Kramer, P. Longa, H. Polat, J. E. Ricardini, and G. Zanon, "Submission to NIST's post-quantum project: Lattice-based digital signature scheme qTESLA," 2018.
6 R. E. Bansarkhani and J. Sturm. "An efficient lattice-based multisignature scheme with applications to bitcoins." International Conference on Cryptology and Network Security, pp. 140-155, Springer, Cham, Nov. 2016.
7 D. Boneh, M. Drijvers, and G. Neven, "Compact multi-signatures for smaller blockchains," International Conference on the Theory and Application of Cryptology and Information Security, pp. 435-464, Springer, Cham, Dec. 2018.
8 D. Micciancio, "Generalized compact knapsacks, cyclic lattices, and efficient one-way functions," computational complexity, vol. 16, no. 4, pp. 365-411, Dec. 2007.   DOI
9 D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures," Journal of Cryptology, vol. 13, no. 3, pp. 361-396, Dec. 2000   DOI
10 G. Maxwell, A. Poelstra, Y. Seurin, and P. Wuille., "Simple schnorr multi-signatures with applications to bitcoin," Designs, Codes and Cryptography, vol. 87, no. 4, pp. 2139-2164, Feb. 2019.   DOI
11 L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, P. Schwabe, G. Seiler, and D. Stehle, "CRYSTALS - Dilithium: A Lattice-Based Digital Signatures Scheme," IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2018, no. 1, pp. 238-268, Feb. 2018.
12 M. Bellare and G. Neven., "Multi-signatures in the plain public-key model and a general forking lemma," A Proceedings of the 13th ACM conference on Computer and communications security, pp. 390-399, Oct. 2006.
13 R. Behnia, M.O. Ozmen, A.A. Yavuz, and M. Rosulek, "TACHYON: fast signatures from compact knapsack," Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1855-1867, Oct. 2018.
14 P.W. Shor, "Algorithms for quantum computation: Discrete logarithms and factoring," Proceedings 35th annual symposium on foundations of computer science, pp. 124-134, Ieee, Nov. 1994.