Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model

02/20/2019
by   Jelle Don, et al.
0

The famous Fiat-Shamir transformation turns any public-coin three-round interactive proof, i.e., any so-called sigma-protocol, into a non-interactive proof in the random-oracle model. We study this transformation in the setting of a quantum adversary that in particular may query the random oracle in quantum superposition. Our main result is a generic reduction that transforms any quantum dishonest prover attacking the Fiat-Shamir transformation in the quantum random-oracle model into a similarly successful quantum dishonest prover attacking the underlying sigma-protocol (in the standard model). Applied to the standard soundness and proof-of-knowledge definitions, our reduction implies that both these security properties, in both the computational and the statistical variant, are preserved under the Fiat-Shamir transformation even when allowing quantum attacks. Our result improves and completes the partial results that have been known so far, but it also proves wrong certain claims made in the literature. In the context of post-quantum secure signature schemes, our results imply that for any sigma-protocol that is a proof-of-knowledge against quantum dishonest provers (and that satisfies some additional natural properties), the corresponding Fiat-Shamir signature scheme is secure in the quantum random-oracle model. For example, we can conclude that the non-optimized version of Fish, which is the bare Fiat-Shamir variant of the NIST candidate Picnic, is secure in the quantum random-oracle model.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/04/2021

Online-Extractability in the Quantum Random-Oracle Model

We show the following generic result. Whenever a quantum query algorithm...
research
06/16/2022

Adaptive versus Static Multi-oracle Algorithms, and Quantum Security of a Split-key PRF

In the first part of the paper, we show a generic compiler that transfor...
research
03/18/2022

Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform

In known security reductions for the Fujisaki-Okamoto transformation, de...
research
10/28/2020

Tight adaptive reprogramming in the QROM

The random oracle model (ROM) enjoys widespread popularity, mostly becau...
research
09/05/2021

Post-Quantum VRF and its Applications in Future-Proof Blockchain System

A verifiable random function (VRF in short) is a powerful pseudo-random ...
research
12/28/2021

Quantum Merkle Trees

Commitment scheme is a central task in cryptography, where a party (typi...
research
08/09/2019

Composable and Finite Computational Security of Quantum Message Transmission

Recent research in quantum cryptography has led to the development of sc...

Please sign up or login with your details

Forgot password? Click here to reset