Protecting Quantum Procrastinators with Signature Lifting: A Case Study in Cryptocurrencies

03/12/2023
by   Or Sattath, et al.
0

Current solutions to quantum vulnerabilities of widely used cryptographic schemes involve migrating users to post-quantum schemes before quantum attacks become feasible. This work deals with protecting quantum procrastinators: users that failed to migrate to post-quantum cryptography in time. To address this problem in the context of digital signatures, we introduce a technique called signature lifting, that allows us to lift a deployed pre-quantum signature scheme satisfying a certain property to a post-quantum signature scheme that uses the same keys. Informally, the said property is that a post-quantum one-way function is used "somewhere along the way" to derive the public-key from the secret-key. Our constructions of signature lifting relies heavily on the post-quantum digital signature scheme Picnic (Chase et al., CCS'17). Our main case-study is cryptocurrencies, where this property holds in two scenarios: when the public-key is generated via a key-derivation function or when the public-key hash is posted instead of the public-key itself. We propose a modification, based on signature lifting, that can be applied in many cryptocurrencies for securely spending pre-quantum coins in presence of quantum adversaries. Our construction improves upon existing constructions in two major ways: it is not limited to pre-quantum coins whose ECDSA public-key has been kept secret (and in particular, it handles all coins that are stored in addresses generated by HD wallets), and it does not require access to post-quantum coins or using side payments to pay for posting the transaction.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/13/2019

SPHINCS^+ digital signature scheme with GOST hash functions

Many commonly used public key cryptosystems will become insecure once a ...
research
03/01/2022

Signature Correction Attack on Dilithium Signature Scheme

Motivated by the rise of quantum computers, existing public-key cryptosy...
research
10/13/2022

A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange

We propose design methodologies for building a compact, unified and prog...
research
08/29/2023

Area Efficient Modular Reduction in Hardware for Arbitrary Static Moduli

Modular reduction is a crucial operation in many post-quantum cryptograp...
research
09/13/2018

Pre- and post-quantum Diffie-Hellman from groups, actions, and isogenies

Diffie-Hellman key exchange is at the foundations of public-key cryptogr...
research
02/24/2023

Smaller public keys for MinRank-based schemes

MinRank is an NP-complete problem in linear algebra whose characteristic...
research
07/16/2018

Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes

In this paper we consider a post-quantum digital signature scheme based ...

Please sign up or login with your details

Forgot password? Click here to reset