Efficient post-quantum secure deterministic wallet scheme

被引:0
|
作者
Hu, Mingxing [1 ]
Liu, Zhen [1 ]
Zhou, Yunhong [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, 3-509 SEIEE Bldg,800 Dongchuan Rd, Shanghai 200240, Peoples R China
来源
CYBERSECURITY | 2024年 / 7卷 / 01期
基金
中国国家自然科学基金;
关键词
Deterministic wallets; Post-quantum secure; Lattice-based cryptography; Blockchain; Cryptocurrency; SIGNATURE SCHEME; LATTICE;
D O I
10.1186/s42400-024-00216-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the advent of Bitcoin, cryptocurrencies have gained substantial popularity, and crypto wallets have evolved into the predominant tool for safeguarding and managing cryptographic keys to access cryptocurrency funds. Deterministic wallets are proposed as an advanced wallet mechanism to provide benefits such as low-maintenance, easy backup and recovery, and support for functionalities required by cryptocurrencies. Alkeilani Alkadri et al. (ACM CCS'20) presented the first post-quantum secure deterministic wallet scheme, but it exhibits a gap to bridge before achieving practical applicability, as reflected in both their concrete parameters size and computational efficiency. In this paper, we propose an efficient post-quantum secure deterministic wallet scheme. In particular, we present a new construction method for deterministic wallets, prove the security in the quantum random oracle model, and provide an efficient instantiation. The comparison result, with the work of Alkeilani Alkadri et al. (ACM CCS'20), shows our work has a comprehensive improvement on efficiency, e.g., the pk size is approximate to 40.7\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\approx 40.7$$\end{document} times shorter, sk is approximate to 9.2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\approx 9.2$$\end{document} times shorter, and the signing time is approximate to 3.1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\approx 3.1$$\end{document} times faster.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Efficient Post-Quantum Secure Deterministic ThresholdWallets from Isogenies
    Das, Poulami
    Erwig, Andreas
    Meyer, Michael
    Struck, Patrick
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 522 - 532
  • [2] An efficient post-quantum secure dynamic EPID signature scheme using lattices
    Biswas, Chinmoy
    Dutta, Ratna
    Sarkar, Sumanta
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (05) : 13791 - 13820
  • [3] An efficient post-quantum secure dynamic EPID signature scheme using lattices
    Chinmoy Biswas
    Ratna Dutta
    Sumanta Sarkar
    Multimedia Tools and Applications, 2024, 83 : 13791 - 13820
  • [4] A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain
    Gao, Yu-Long
    Chen, Xiu-Bo
    Chen, Yu-Ling
    Sun, Ying
    Niu, Xin-Xin
    Yang, Yi-Xian
    IEEE ACCESS, 2018, 6 : 27205 - 27213
  • [5] Post-quantum Secure ZRTP
    Ferreira, Loic
    Pascal, Johan
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT I, 2024, 14771 : 3 - 36
  • [6] Post-Quantum Secure Boot
    Kumar, Vinay B. Y.
    Gupta, Naina
    Chattopadhyay, Anupam
    Kasper, Michael
    Krauss, Christoph
    Niederhagen, Ruben
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 1582 - 1585
  • [7] Efficient Parallelism of Post-Quantum Signature Scheme SPHINCS
    Sun, Shuzhou
    Zhang, Rui
    Ma, Hui
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2020, 31 (11) : 2542 - 2555
  • [8] Efficient and Secure Post-Quantum Certificateless Signcryption With Linkability for IoMT
    Xu, Shiyuan
    Chen, Xue
    Guo, Yu
    Yiu, Siu-Ming
    Gao, Shang
    Xiao, Bin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 1119 - 1134
  • [9] A Novel Identicication Scheme for Post-Quantum Secure Digital Right Management
    Akleylek, Sedat
    Soysaldi, Meryem
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 322 - 327
  • [10] A Secure Energy Internet Scheme for IoV Based on Post-Quantum Blockchain
    Zhang, Jiansheng
    Xin, Yang
    Wang, Yuyan
    Lei, Xiaohui
    Yang, Yixian
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (03): : 6323 - 6336