Skip to main content

Variant of Niederreiter-Based Signature Scheme for Blockchain Technology

  • Conference paper
  • First Online:
Proceedings of the Seventh International Conference on Mathematics and Computing

Abstract

The well-known Niederreiter encryption scheme is an improved version of the classical McEliece encryption scheme in terms of key size and encryption efficiency, but the conversion of the scheme to a usable signature scheme is a very challenging process. Moreover, the current blockchain architecture still relies on hard problems that cannot resist quantum algorithms attacks. In this paper, we construct a Niederreiter-based signature scheme with a comprehensive security analysis that is suitable to be used together with the blockchain technology and resistance to Shor’s algorithm for better underlying performance and security of the blockchain architecture.

Supported by Universiti Tunku Abdul Rahman Research Fund (UTARRF), project number: IPSR/RMC/UTARRF/2019-C2/D01, vote number: 6200/D13.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. McEliece RJ (1978) A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA

    Google Scholar 

  2. Shor PW (1994) Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th annual symposium on foundations of computer science. IEEE Computer Society Press. https://doi.org/10.1109/SFCS.1994.365700

  3. Niederreiter H (1986) Knapsack-type crytosystems and algebraic coding theory. Probl Contr Inf Theory 15(2):157–166

    Google Scholar 

  4. Courtois N, Finiasz M, Sendrier N (2001) How to achieve a McEliece-based digital signature scheme. In: Boyd C (ed) Advances in cryptology - ASIACRYPT 2001, (ASIACRYPT 2001), vol 2248. Lecture Notes in Computer Science. Springer, Berlin

    Google Scholar 

  5. Dallot L (2007) Towards a concrete security proof of courtois, finiasz and sendrier signature scheme in research in cryptology, Second Western European Workshop, WEWoRC 2007. Bochum, Germany, Revised Selected Papers, pp 65–77

    Google Scholar 

  6. Lee W, Kim Y-S, Lee Y-W, No J-S (2017) Post quantum signature scheme based on modified Reed-Muller code : pqsigRM, NIST Post-quantum cryptography standardization project

    Google Scholar 

  7. Roy PS, Xu R, Fukushima K, Kiyomoto S, Morozov K, Takagi T (2017) RaCoSS. NIST post-quantum cryptography standardization project, Random code-based signature scheme

    Google Scholar 

  8. Nicolas A, Philippe G, Hauteville A, Ruatta O, Zémor G (2017) RankSign - a signature proposal for the NIST’s call, NIST post-quantum cryptography standardization project

    Google Scholar 

  9. Melchor CA, Aragon N, Bettaieb S, Bidoux L, Blazy O, Deneuville J-C, Gaborit P, Persichetti E, Zémor G, HQC: hamming quasi-cyclic, NIST post-quantum cryptography standardization project

    Google Scholar 

  10. Melchor CA, Aragon N, Bardet M, Bettaieb S, Bidoux L, Blaze O, Deneuville J-C, Gaborit P, Hauteville A, Otmani A, Ruatta O, Tillich JP, Zémor G (2017) ROLLO - Rank-ouroboros. LAKE and LOCKER, NIST post-quantum cryptography standardization project

    Google Scholar 

  11. Nakamoto S (2019) Bitcoin: a peer-to-peer electronic cash system. Cryptography Mailing list. https://metzdowd.com. Accessed 25 May 2019

  12. Johnson D, Menezes A, Vanstone SA (2001) The elliptic curve digital signature scheme. Int J Inf Secur. https://doi.org/10.1007/s102070100002

    Article  Google Scholar 

  13. Yulong G, Xiubo C, Ying S, Xinxin N, Yixian Y (2018) A secure cryptocurrency scheme based on post-quantum blockchain. IEEE Access 1–1. https://doi.org/10.1109/ACCESS.2018.2827203

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Feng-Wei Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lee, FW., Wong, D.C.K., Goi, BM., Lee, WK. (2022). Variant of Niederreiter-Based Signature Scheme for Blockchain Technology. In: Giri, D., Raymond Choo, KK., Ponnusamy, S., Meng, W., Akleylek, S., Prasad Maity, S. (eds) Proceedings of the Seventh International Conference on Mathematics and Computing . Advances in Intelligent Systems and Computing, vol 1412. Springer, Singapore. https://doi.org/10.1007/978-981-16-6890-6_14

Download citation

Publish with us

Policies and ethics