2020
DOI: 10.21638/11701/spbu10.2020.410
|View full text |Cite
|
Sign up to set email alerts
|

Candidate for practical post-quantum signature scheme

Abstract: A new criterion of post-quantum security is used to design a practical signature scheme based on the computational complexity of the hidden discrete logarithm problem. A 4-dimensional finite non-commutative associative algebra is applied as algebraic support of the cryptoscheme. The criterion is formulated as computational intractability of the task of constructing a periodic function containing a period depending on the discrete logarithm value. To meet the criterion, the hidden commutative group possessing t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(17 citation statements)
references
References 5 publications
(9 reference statements)
0
17
0
Order By: Relevance
“…As a substantiation of resistance to quantum attacks, it should be noted that the proposed signature scheme satisfies the general criterion of post-quantum security used to develop HDLP-based signature schemes described in the papers [12][13][14]. The mentioned criterion is formulated as follows [12]: "Based on the public parameters of the signature scheme, the construction of a periodic function containing a period with the length depending on the discrete logarithm value should be a computationally intractable task."…”
Section: Discussionmentioning
confidence: 91%
See 4 more Smart Citations
“…As a substantiation of resistance to quantum attacks, it should be noted that the proposed signature scheme satisfies the general criterion of post-quantum security used to develop HDLP-based signature schemes described in the papers [12][13][14]. The mentioned criterion is formulated as follows [12]: "Based on the public parameters of the signature scheme, the construction of a periodic function containing a period with the length depending on the discrete logarithm value should be a computationally intractable task."…”
Section: Discussionmentioning
confidence: 91%
“…As a substantiation of resistance to quantum attacks, it should be noted that the proposed signature scheme satisfies the general criterion of post-quantum security used to develop HDLP-based signature schemes described in the papers [12][13][14]. The mentioned criterion is formulated as follows [12]: "Based on the public parameters of the signature scheme, the construction of a periodic function containing a period with the length depending on the discrete logarithm value should be a computationally intractable task." The fulfillment of this criterion in the developed signature scheme is ensured by the fact that the elements of the first (second) public key form the basis of a primary group of the order q 3 in the first (second) algebra used as an algebraic carrier, therefore, all possible products Y i 1 Z j 1 U k 1 in the first FAA and Y i 2 Z j 2 U k 2 the second FAA for i, j, k 5 0, 1, 2 .…”
Section: Discussionmentioning
confidence: 91%
See 3 more Smart Citations