skip to main content
10.1007/978-3-030-62576-4_3guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Lattice-Based Provably Secure Multisignature Scheme in Quantum Random Oracle Model

Published: 29 November 2020 Publication History

Abstract

The multisignature schemes are attracted to utilize in some cryptographic applications such as the blockchain. Though the lattice-based constructions of multisignature schemes exist as quantum-secure multisignature, a multisignature scheme whose security is proven in the quantum random oracle model (QROM), rather than the classical random oracle model (CROM), is not known.
In this paper, we propose a first lattice-based multisignature scheme whose security is proven in QROM. The difficultly of proving the security in QROM than CROM is how to program the random oracle in the security proof. Although our proposed scheme is based on the Dilithium-QROM signature whose security is proven in QROM, their proof technique cannot be directly applied to the multisignature setting. To solve the problems in the security proof, we develop several proof techniques in QROM. First, we employ the searching query technique by Targi and Unruh to convert the Dilithium-QROM into the multisignature setting. For the second, we develop a new programming technique in QROM, since the conventional programming techniques seem not to work in the multisignature setting of QROM. We combine the programming technique by Unruh with the one by Liu and Zhandry. The new technique enables us to program the random oracle in QROM and to construct the signing oracle in the security proof.

References

[1]
Abdalla M, Fouque PA, Lyubashevsky V, and Tibouchi M Tightly secure signatures from lossy identification schemes J. Cryptol. 2016 29 3 597-631
[2]
Barthe, G., et al.: Masking the GLP lattice-based signature scheme at any order. Cryptology ePrint Archive, Report 2018/381 (2018). https://eprint.iacr.org/2018/381
[3]
Barthe G et al. Nielsen JB, Rijmen V, et al. Masking the GLP lattice-based signature scheme at any order Advances in Cryptology – EUROCRYPT 2018 2018 Cham Springer 354-384
[4]
Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 390–399. ACM, New York (2006).
[5]
Boneh D, Dagdelen Ö, Fischlin M, Lehmann A, Schaffner C, and Zhandry M Lee DH and Wang X Random oracles in a quantum world Advances in Cryptology – ASIACRYPT 2011 2011 Heidelberg Springer 41-69
[6]
de Castro, A.: Quantum one-way permutation over the finite field of two elements. Quantum Inf. Process. 16(6) (2017).
[7]
Damågrd, I., Orlandi, C., Takahashi, A., Tibouchi, M.: Two-round n-out-of-n and multi-signatures and trapdoor commitment from lattices. Cryptology ePrint Archive, Report 2020/1110 (2020). https://eprint.iacr.org/2020/1110
[8]
Don J, Fehr S, Majenz C, and Schaffner C Boldyreva A and Micciancio D Security of the Fiat-Shamir transformation in the quantum random-oracle model Advances in Cryptology – CRYPTO 2019 2019 Cham Springer 356-383
[9]
Ducas, L., et al.: CRYSTALS-Dilithium: a lattice-based digital signature scheme. IACR Trans. Cryptogr. Hardware Embed. Syst. 2018(1), 238–268 (2018).
[10]
El Bansarkhani R and Sturm J Foresti S and Persiano G An efficient lattice-based multisignature scheme with applications to bitcoins Cryptology and Network Security 2016 Cham Springer 140-155
[11]
Fiat A and Shamir A Odlyzko AM How to prove yourself: practical solutions to identification and signature problems Advances in Cryptology — CRYPTO 86 1987 Heidelberg Springer 186-194
[12]
Fujisaki E and Okamoto T Secure integration of asymmetric and symmetric encryption schemes J. Cryptol. 2013 26 1 80-101
[13]
Fukumitsu, M., Hasegawa, S.: A tightly-secure lattice-based multisignature. In: Proceedings of the 6th on ASIA Public-Key Cryptography Workshop, APKC 2019, pp. 3–11. ACM, New York (2019). http://doi.acm.org/10.1145/3327958.3329542
[14]
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, STOC 2008, pp. 197–206. ACM, New York (2008). http://doi.acm.org/10.1145/1374376.1374407
[15]
Güneysu T, Lyubashevsky V, and Pöppelmann T Prouff E and Schaumont P Practical lattice-based cryptography: a signature scheme for embedded systems Cryptographic Hardware and Embedded Systems - CHES 2012 2012 Heidelberg Springer 530-547
[16]
Itakura K and Nakamura K A public-key cryptosystem suitable for digital multisignature NEC Res. Dev. 1983 71 1-8
[17]
Katz, J., Wang, N.: Efficiency improvements for signature schemes with tight security reductions. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 155–164. ACM, New York (2003).
[18]
Kiltz, E., Lyubashevsky, V., Schaffner, C.: A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model. Cryptology ePrint Archive, Report 2017/916 (2017). https://eprint.iacr.org/2017/916
[19]
Kiltz E, Lyubashevsky V, and Schaffner C Nielsen JB and Rijmen V A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model Advances in Cryptology - EUROCRYPT 2018 2018 Cham Springer 552-586
[20]
Liu Q and Zhandry M Boldyreva A and Micciancio D Revisiting post-quantum Fiat-Shamir Advances in Cryptology – CRYPTO 2019 2019 Cham Springer 326-355
[21]
Nielsen MA and Chuang IL Quantum Computation and Quantum Information 2000 Cambridge Cambridge University Press
[22]
[23]
Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, STOC 2008, pp. 187–196. ACM, New York (2008). http://doi.acm.org/10.1145/1374376.1374406
[24]
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999).
[25]
Targhi EE and Unruh D Hirt M and Smith A Post-quantum security of the Fujisaki-Okamoto and OAEP transforms Theory of Cryptography 2016 Heidelberg Springer 192-216
[26]
Unruh D Oswald E and Fischlin M Non-interactive zero-knowledge proofs in the quantum random oracle model Advances in Cryptology - EUROCRYPT 2015 2015 Heidelberg Springer 755-784
[27]
Zhandry M Safavi-Naini R and Canetti R Secure identity-based encryption in the quantum random oracle model Advances in Cryptology – CRYPTO 2012 2012 Heidelberg Springer 758-775
[28]
Zhandry M Boldyreva A and Micciancio D How to record quantum queries, and applications to quantum indifferentiability Advances in Cryptology – CRYPTO 2019 2019 Cham Springer 239-268

Cited By

View all

Index Terms

  1. A Lattice-Based Provably Secure Multisignature Scheme in Quantum Random Oracle Model
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      Provable and Practical Security: 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings
      Nov 2020
      425 pages
      ISBN:978-3-030-62575-7
      DOI:10.1007/978-3-030-62576-4
      • Editors:
      • Khoa Nguyen,
      • Wenling Wu,
      • Kwok Yan Lam,
      • Huaxiong Wang

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 29 November 2020

      Author Tags

      1. Lattice cryptography
      2. Multisigature
      3. Quantum random oracle model
      4. CRYSTALS-Dilithium

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 01 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media