ABSTRACT
Blockchain technology has emerged as a cornerstone of se- cure online activities, leveraging an extensive array of cryp- tographic tools. This paper delves into an extensive survey of the current literature on post-quantum secure digital sig- natures, focusing on those with advanced, exotic features that play pivotal roles in the blockchain ecosystem. These signatures serve essential functions, including account man- agement,enhancing consensus efficiency,enabling scriptless blockchains, and fortifying user privacy. The term "exotic" in this context signifies signatures that transcend conven- tional properties such as unforgeability, introducing novel functionalities that redefine the blockchain landscape. Our exploration centers on several such exotic signatures, in- cluding multi-/aggregate, threshold, adaptor, blind, and ring signatures. These cryptographic innovations not only bolster security but also empower blockchain systems in unprece- dented ways.Within this comprehensive treatment of exotic signatures, we engage in discussions surrounding the pre- vailing challenges and chart promising avenues for future research within the post-quantum realm. As quantum threats loom ever closer, our aim is to catalyze further inquiry, facil- itating the broader accessibility of post-quantum cryptogra- phy. This, in turn, will fortify blockchain systems, preparing them to withstand the impending quantum era while fos- tering innovation and excellence in the field of blockchain security.
- [1] Grover, L. K. (1996). A Fast Quantum Mechanical Algorithm for Data- base Search. Proceedings of the Twenty-eighth Annual ACM Sympo- sium on Theory of Computing (pp. 212-219).Google Scholar
- [2]Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Proceedings of the 2008 ACM SIGMETRICS/IFIP Performance Confer- ence (pp. 10-21).Google Scholar
- [3]Shor, P. W. (1997). Polynomial-Time Algorithms for Prime Factoriza- tion and Discrete Logarithms on a Quantum Computer. SIAM Journal on Computing, 26(5), 1484-1509. doi:10.1137/S0097539795293172.Google ScholarDigital Library
- [4]Grover, L. K. (1997). Quantum Mechanics Helps in Searching for a Needle in a Haystack. Physical Review Letters, 79(2), 325-328. doi:10.1103/PhysRevLett.79.325.Google ScholarCross Ref
- [5]Regev, O. (2009). On lattices, learning with errors, random linear codes, and cryptography. Proceedings of the Thirty-seventh Annual ACM Symposium on Theory of Computing (pp. 84-93).Google ScholarDigital Library
- [6]McEliece, R. J. (1978). A Public-Key Cryptosystem Based on Algebraic Coding Theory. DSN Progress Report, 42(44), 114-116.Google Scholar
- [7]Merkle, R. C. (1987). A Digital Signature Based on a Conventional Encryption Function. Advances in Cryptology — CRYPTO ’87 (pp. 369-378).Google Scholar
- [8] Patarin, J. (1996). Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms. Advances in Cryptology — EUROCRYPT ’96 (pp. 33-48).Google Scholar
- [9]Regev, O. (2009). On lattices, learning with errors, random linear codes, and cryptography. Proceedings of the Thirty-seventh Annual ACM Symposium on Theory of Computing (pp. 84-93).Google ScholarDigital Library
- [10]McEliece, R. J. (1978). A Public-Key Cryptosystem Based on Algebraic Coding Theory. DSN Progress Report, 42(44), 114-116.Google Scholar
- [11]Patarin, J. (1996). Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms. Advances in Cryptology — EUROCRYPT ’96 (pp. 33-48).Google Scholar
- [12]Grover, L. K. (1997). Quantum Mechanics Helps in Searching for a Needle in a Haystack. Physical Review Letters, 79(2), 325-328. doi:10.1103/PhysRevLett.79.325.Google ScholarCross Ref
- [13]Jao, D., De Feo, L. (2011). Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies. Journal of Mathematical Cryptology, 8(3), 209-247. doi:10.1515/JMC.2014.003.Google ScholarCross Ref
- [14] Ducas, L., Micciancio, D. (2018). FHEW: Homomorphic Encryption for Whom? A Case Study of the Millionaire Problem. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 1353-1365.Google Scholar
- [15]Eyal, I., Sirer, E. G. (2018). Majority Is Not Enough: Bitcoin Mining Is Vulnerable. Communications of the ACM, 61(7), 95-102.Google ScholarDigital Library
- [16] Luu, L., Teutsch, J., Kulkarni, R., Zhao, H., Saxena, P. (2016). Demysti- fying Incentives in the Consensus Computer. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 706-719.Google Scholar
- [17] Kshetri, N. (2017). Can blockchain strengthen the Internet of Things? IT Professional, 19(4), 68-72.Google ScholarDigital Library
- [18]Post-Quantum Cryptography Standardization. National Institute of Standards and Technology (NIST). [Online] https://csrc.nist.gov/projects/post-quantum-cryptography.Google Scholar
- [19]Shbair, W., Biswas, S., Anwar, A. (2019). A Review of Blockchain Tech- nologies for IoT Security and Privacy. IEEE Access, 7, 13949-13961.Google Scholar
- [20]Shbair, W., Biswas, S., Anwar, A. (2019). A Review of Blockchain Tech- nologies for IoT Security and Privacy. IEEE Access, 7, 13949-13961.Google Scholar
- [21] Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J. M. (2018). CrypTFlow: Secure TensorFlow Inference. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018(3)57-84.Google Scholar
- [22]Alwen, J., Coretti, S., Dodis, Y. (2019). On Composable and Practical Hybrid Lattice-Symmetric Key Encryption. Advances in Cryptology – EUROCRYPT 2019 (pp. 631-660).Google Scholar
- [23] Post-Quantum Cryptography Standardization. National Institute of Standards and Technology (NIST). [Online] https://csrc.nist.gov/projects/post-quantum-cryptography.Google Scholar
- [24] Alkadri, D., El-Hajj, W. (2019). Quantum-Secure Smart Contracts for the Blockchain. IEEE Transactions on Computers, 69(9), 1235-1249.Google Scholar
- [25]Stewart, J., Shi, E. (2019). Zkledger: Privacy-Preserving Auditing for Distributed Ledgers. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2125-2142.Google Scholar
- [26]Post-Quantum Cryptography Standardization. National Institute of Standards and Technology (NIST). [Online] https://csrc.nist.gov/projects/post-quantum-cryptography.Google Scholar
- [27]Alwen, J., Coretti, S., Dodis, Y. (2019). On Composable and Practical Hybrid Lattice-Symmetric Key Encryption. Advances in Cryptology – EUROCRYPT 2019 (pp. 631-660).Google Scholar
- [28]Alkadri, D., El-Hajj, W. (2019). Quantum-Secure Smart Contracts for the Blockchain. IEEE Transactions on Computers, 69(9), 1235-1249.Google Scholar
Index Terms
- Surveying Quantum-Proof Blockchain Security: The Era of Exotic Signatures
Recommendations
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions
Blockchain technology provides efficient and secure solutions to various online activities by utilizing a wide range of cryptographic tools. In this article, we survey the existing literature on post-quantum secure digital signatures that possess exotic ...
Compact Ring Signatures with Post-Quantum Security in Standard Model
Information Security and CryptologyAbstractRing signatures allow a ring member to produce signatures on behalf of all ring users but remain anonymous. At PKC 2022, Chatterjee et al. defined post-quantum ring signatures with post-quantum anonymity and post-quantum blind-unforgeability. ...
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism
ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications securityThis paper discusses how to realize practical post-quantum authenticated key exchange (AKE) with strong security, i.e., CK+ security (Krawczyk, CRYPTO 2005). It is known that strongly secure post-quantum AKE protocols exist on a generic construction ...
Comments