Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model

被引:10
|
作者
Eaton, Edward [1 ,2 ]
机构
[1] ISARA Corp, Waterloo, ON, Canada
[2] Univ Waterloo, Waterloo, ON, Canada
来源
关键词
Post-quantum cryptography; Digital signatures; Random oracles; Hash functions; Multi-user setting;
D O I
10.1007/978-3-319-72565-9_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital signatures constructed solely from hash functions offer competitive signature sizes and fast signing and verifying times. Moreover, the security of hash functions against a quantum adversary is believed to be well understood. This means that hash-based signatures are strong candidates for standard use in a post-quantum world. The Leighton-Micali signature scheme (LMS) is one such scheme being considered for standardization. However all systematic analyses of LMS have only considered a classical adversary. In this work we close this gap by showing a proof of the security of LMS in the quantum random-oracle model. Our results match the bounds imposed by Grover's search algorithm within a constant factor, and remain tight in the multi-user setting.
引用
收藏
页码:263 / 280
页数:18
相关论文
共 50 条
  • [41] Quantum-Access Security of Hash-Based Signature Schemes
    Yuan, Quan
    Tibouchi, Mehdi
    Abe, Masayuki
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 343 - 380
  • [42] Fault Detection Architectures for Post-Quantum Cryptographic Stateless Hash-Based Secure Signatures Benchmarked on ASIC
    Mozaffari-Kermani, Mehran
    Azarderakhsh, Reza
    Aghaie, Anita
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [43] Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model
    Zhang, Zongyang
    Chen, Yu
    Chow, Sherman S. M.
    Hanaoka, Goichiro
    Cao, Zhenfu
    Zhao, Yunlei
    PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 435 - 454
  • [44] A scalable post-quantum hash-based group signature
    Masoumeh Shafieinejad
    Navid Nasr Esfahani
    Designs, Codes and Cryptography, 2021, 89 : 1061 - 1090
  • [45] A general attack model on hash-based client puzzles
    Price, G
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 319 - 331
  • [46] A Hash-Based Quantum-Resistant Chameleon Signature Scheme
    Thanalakshmi, P.
    Anitha, R.
    Anbazhagan, N.
    Cho, Woong
    Joshi, Gyanendra Prasad
    Yang, Eunmok
    SENSORS, 2021, 21 (24)
  • [47] A scalable post-quantum hash-based group signature
    Shafieinejad, Masoumeh
    Esfahani, Navid Nasr
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (05) : 1061 - 1090
  • [48] Quantum Depth in the Random Oracle Model
    Arora, Atul Singh
    Coladangelo, Andrea
    Coudron, Matthew
    Gheorghiu, Alexandru
    Singh, Uttam
    Waldner, Hendrik
    PROCEEDINGS OF THE 55TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, STOC 2023, 2023, : 1111 - 1124
  • [49] Security arguments for blind signatures in random oracle model
    Hu, Xiaoming
    Huang, Shangteng
    Journal of Computational Information Systems, 2009, 5 (01): : 75 - 81
  • [50] A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme
    Thanalakshmi, P.
    Anitha, R.
    Anbazhagan, N.
    Park, Chulho
    Joshi, Gyanendra Prasad
    Seo, Changho
    MATHEMATICS, 2022, 10 (10)