Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup

نویسندگان

چکیده

This paper defines a new practical construction for code-based signature scheme. We introduce protocol that is designed to follow the recent paradigm known as “Sigma with helper”, and prove protocol’s security reduces directly Syndrome Decoding Problem. The then converted full-fledged scheme via sequence of generic steps include: removing role helper; incorporating variety optimizations (using e.g., Merkle trees); applying Fiat–Shamir transformation. resulting EUF-CMA secure in QROM, following advantages: (a) Security relies on only minimal assumptions backed by long-studied NP-complete problem; (b) trusted setup structure allows obtaining an arbitrarily small soundness error. minimizes required number repetitions, thus alleviating major bottleneck associated schemes. outline initial performance estimation confirm our competitive respect existing solutions similar type.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge

At EUROCRYPT’88, we introduced an interactive zero-howledge protocol ( G ~ O U and Quisquater [13]) fitted to the authentication of tamper-resistant devices (e.g. smart cads , Guillou and Ugon [14]). Each security device stores its secret authentication number, an RSA-like signature computed by an authority from the device identity. Any transaction between a tamperresistant security device and ...

متن کامل

Code-based Ring Signature Scheme

McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosystems like McEliece do not allow practical digital signatures. Although X.M. Wang presented a code-based signature scheme in 1990, some authors find that it is not secure. Recently, T.Courtois et al. show a new way to ...

متن کامل

A code-based group signature scheme

This work is the extended version of [1] which proposed the first code-based group signature. The new group signature scheme we present here has numerous advantages over all existing post-quantum constructions and even competes (in terms of properties) with pairing based constructions: it allows to add new members during the lifetime of the group (dynamic). Plus, it appears that our scheme migh...

متن کامل

A Provably Secure Group Signature Scheme from Code-Based Assumptions

We solve an open question in code-based cryptography by introducing the first provably secure group signature scheme from codebased assumptions. Specifically, the scheme satisfies the CPA-anonymity and traceability requirements in the random oracle model, assuming the hardness of the McEliece problem, the Learning Parity with Noise problem, and a variant of the Syndrome Decoding problem. Our co...

متن کامل

A Practical ID-Based Group Signature Scheme

A new ID-based group signature scheme, in which group managers (Membership Manager and Tracing Manager) and group members are all ID-based, is presented in this paper. Due to the nice constructive method of group signature schemes and the sound properties of bilinear pairing, it is shown that our scheme has the advantages of concurrent joining of users, immediate revocation of group members, ea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cryptography

سال: 2022

ISSN: ['2410-387X']

DOI: https://doi.org/10.3390/cryptography6010005