2020
DOI: 10.31799/1684-8853-2020-6-21-29
|View full text |Cite
|
Sign up to set email alerts
|

A novel method for development of post-quantum digital signature schemes

Abstract: Introduction: Development of post-quantum digital signature standards represents a current challenge in the area of cryptography. Recently, the signature schemes based on the hidden discrete logarithm problem had been proposed. Further development of this approach represents significant practical interest, since it provides possibility of designing practical signature schemes possessing small size of public key and signature. Purpose: Development of the method for designing post-quantum signature schemes and n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…The technique of doubling the verification equation when designing a signature scheme was previously used in [12,14], but in the proposed method it is extended to the case of using two different algebras as a single algebraic carrier of the signature scheme. At the same time, it has a new purpose, which is to provide binding of public key elements to a fixed hidden group in each of the used algebras.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…The technique of doubling the verification equation when designing a signature scheme was previously used in [12,14], but in the proposed method it is extended to the case of using two different algebras as a single algebraic carrier of the signature scheme. At the same time, it has a new purpose, which is to provide binding of public key elements to a fixed hidden group in each of the used algebras.…”
Section: Discussionmentioning
confidence: 99%
“…As a substantiation of resistance to quantum attacks, it should be noted that the proposed signature scheme satisfies the general criterion of post-quantum security used to develop HDLP-based signature schemes described in the papers [12][13][14]. The mentioned criterion is formulated as follows [12]: "Based on the public parameters of the signature scheme, the construction of a periodic function containing a period with the length depending on the discrete logarithm value should be a computationally intractable task."…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations