39 Hits in 2.3 sec

A Blockchain System Based on Quantum-Resistant Digital Signature

Peijun Zhang, Lianhai Wang, Wei Wang, Kunlun Fu, Jinpeng Wang
2021 Security and Communication Networks  
This paper presents a blockchain system based on lattice cipher, which can resist the attack of quantum computation.  ...  The most challenge is that the size of public keys and signatures used by lattice cryptosystems is typically very large.  ...  Lattice Signature Scheme. At present, the digital signature based on lattice cipher can be divided into three types: lattice aggregation signature, proxy signature, and fuzzy identity signature.  ... 
doi:10.1155/2021/6671648 doaj:b576f0e1d84f42a5be88c2700073add7 fatcat:xkw5zwer5jbanesa4imsr7woia

Evaluation of Post-Quantum Distributed Ledger Cryptography

Robert Campbell
2019 The Journal of British Blockchain Association  
This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (ECDSA) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash,  ...  lattice-based cryptography countermeasure that can be implemented near-term and provide a basis for a coordinated industrywide lattice-based public-key implementation.  ...  The scope of this work evaluates the lattice-based digital signature scheme qTESLA, based on the verifiable hardness of the decisional Ring Learning With Errors (R-LWE) [4] .  ... 
doi:10.31585/jbba-2-1-(4)2019 fatcat:gmgojklruvgz7ppbnvxfejw4l4

Transitioning to a Hyperledger Fabric Quantum-Resistant Classical Hybrid Public Key Infrastructure

Robert Campbell
2019 The Journal of British Blockchain Association  
signature scheme qTESLA.  ...  This research presents independent evaluation and testing of the National Institute of Standards and Technology (NIST), based Second Round Candidate Post-Quantum Cryptography (PQC), lattice-based digital  ...  other lattice-based signature schemes.  ... 
doi:10.31585/jbba-2-2-(4)2019 fatcat:mmzq3d42bzbwhd5fw3dky5aciu

Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA

Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer
2020 Transactions on Cryptographic Hardware and Embedded Systems  
These flexible, publicly-available accelerators are leveraged to demonstrate the first hardware-software co-design using RISC-V of the post-quantum lattice-based signature scheme qTESLA with provably secure  ...  This paper presents a set of efficient and parameterized hardware accelerators that target post-quantum lattice-based cryptographic schemes, including a versatile cSHAKE core, a binary-search CDT-based  ...  Acknowledgments We would like to thank the reviewers and the shepherd for their useful feedback. Nina Bindel was supported by the NSERC Discovery Accelerator Supplement grant RGPIN-2016-05146.  ... 
doi:10.13154/tches.v2020.i3.269-306 dblp:journals/tches/WangTJBLS20 fatcat:ztxzwdv3jvenfa7p7mhkxolyye

Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms

Crystal Andrea Roma, Chi-En Amy Tai, M. Anwar Hasan
2021 IEEE Access  
ACKNOWLEDGMENT This work was funded in part by the Natural Sciences and Engineering Research Council of Canada.  ...  An early version of this work is available as a technical report on the University of Waterloo's Centre for Applied Cryptographic Research website and was presented at NIST's Second PQC Standardization  ...  and lattice, multivariate, hash, and other for digital signature schemes.  ... 
doi:10.1109/access.2021.3077843 fatcat:o62peui5ufaybi4fnevrem5apq

Lattice-based Cryptography for IoT in A Quantum World: Are We Ready?

Ayesha Khalid, Sarah McCarthy, Maire O'Neill, Weiqiang Liu
2019 2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces (IWASI)  
The lattice-based schemes make the largest group of these schemes (12 out of the 26) and the only candidate having schemes belonging to the KEM and digital signatures category.  ...  This work investigates the practicality of lattice-based post quantum schemes, both for digital signatures and key exchange, based on the following bench-marks critical to IoT applications. • Communication  ...  Lattice-based PQC KEMs Saber [16] Key  ... 
doi:10.1109/iwasi.2019.8791343 dblp:conf/iwasi/KhalidMOL19 fatcat:7evkdnumwjaqbc23e6pz3uz4sa

Post Quantum Secure Command and Control of Mobile Agents : Inserting quantum-resistant encryption schemes in the Secure Robot Operating System [article]

Richa Varma, Chris Melville, Claudio Pinello, Tuhin Sahai
2020 arXiv   pre-print
We integrate these schemes in the application and network layers, and study the performance of these methods by comparing them to present day security schemes such as the widely used RSA algorithm.  ...  Given the active development of new quantum resistant encryption techniques, we report the first integration of post-quantum secure encryption schemes with the robot operating system (ROS) and C&C of mobile  ...  In particular, we tested, a) qTesla: a family of LWE based PQS digital signature schemes, b) BLISS: a lattice based PQS digital signature scheme, c) NTRU: a lattice based PQS cryptosystem for encrypting  ... 
arXiv:2009.07937v1 fatcat:3ymhwtfa4fbqlkdmueu4m4ljwq

An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms

Malik Imran, Zain Ul Abideen, Samuel Pagliarini
2020 Electronics  
In this work, we have investigated how lattice-based candidate algorithms fare when implemented in hardware.  ...  To achieve this, we have assessed 12 lattice-based algorithms in order to identify their basic building blocks.  ...  The funders had no role in the design of the study, in the data collection, analyses, extraction of data, in writing the manuscript, and in the decision to publish the results.  ... 
doi:10.3390/electronics9111953 fatcat:vhy3rkjlq5cqvodm74jvtnaawq

PQFabric: A Permissioned Blockchain Secure from Both Classical and Quantum Attacks [article]

Amelia Holcomb, Geovandro C. C. F. Pereira, Bhargav Das, Michele Mosca
2020 arXiv   pre-print
Also, MSP-issued credentials may use only one signature scheme, tying the credential-related functions to classical single-signature primitives.  ...  In this paper, we propose a redesign of Fabric's credential-management procedures and related specifications in order to incorporate hybrid digital signatures, protecting against both classical and quantum  ...  Although the paper discusses the principle of hybrid signatures, it ultimately examines only a fixed non-hybrid signature scheme (qTesla), while we implement and analyze hybrid signatures that are configurable  ... 
arXiv:2010.06571v3 fatcat:wkczs5h4xfbz3kizywvhl7mlcu

Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device [article]

Jon Barton, William J Buchanan, Will Abramson, Nikolaos Pitropakis
2019 arXiv   pre-print
It also threatens methods based on discrete logarithms, such as with the Diffie-Hellman key exchange method.  ...  This threatens the security of any cryptographic system which often relies on the difficulty of factorisation.  ...  However, at the time of writing, only Dilithium and qTESLA are available for use as signature schemes.  ... 
arXiv:1912.12257v1 fatcat:nzffxutvibbl3ek6pyi26hq5k4

Quantum-resistant digital signatures schemes for low-power IoT [article]

Hannes Hattenbach
2021 arXiv   pre-print
Quantum computers are on the horizon to get to a sufficient size. These will then be able to break most of the encryption and signature schemes currently in use.  ...  This is the case for human interface devices as well as for IoT nodes. In this paper i am comparing some signature schemes currently in the process of standardization by the NIST.  ...  But, all these schemes are stateless and both Dilithium and FALCON (as well as qTesla) are lattice based schemes, the last finalist, Rainbow is code based, and as we can also see from the enormous signature  ... 
arXiv:2106.11710v1 fatcat:kqkiaeodofh7pj24q2h52usgoy

Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks

Tiago M. Fernandez-Carames, Paula Fraga-Lamas
2020 IEEE Access  
Furthermore, extensive comparisons are provided on the characteristics and performance of the most promising post-quantum public-key encryption and digital signature schemes for blockchains.  ...  However, the fast progress of quantum computing has opened the possibility of performing attacks based on Grover's and Shor's algorithms in the near future.  ...  Finally, it is worth mentioning the lattice-based signature schemes presented in [174] , [175] .  ... 
doi:10.1109/access.2020.2968985 fatcat:7wsxhxrfojdmzcxtjtrk6cmcci

Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols [article]

Utsav Banerjee and Tenzin S. Ukyab and Anantha P. Chandrakasan
2019 arXiv   pre-print
key encapsulation and signature protocols Frodo, NewHope, qTESLA, CRYSTALS-Kyber and CRYSTALS-Dilithium, achieving up to an order of magnitude improvement in performance and energy-efficiency compared  ...  We also discuss how masking-based DPA countermeasures can be implemented on the Sapphire core without any changes to the hardware.  ...  The authors also thank the anonymous reviewers for their valuable comments and suggestions.  ... 
arXiv:1910.07557v1 fatcat:suymd56szfe5fas2vxncdbu5h4

Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions

Bertrand Cambou, Michael Gowanlock, Bahattin Yildiz, Dina Ghanaimiandoab, Kaitlyn Lee, Stefan Nelson, Christopher Philabaum, Alyssa Stenberg, Jordan Wright
2021 Applied Sciences  
Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers.  ...  This paper describes practical ways to generate keys from physical unclonable functions, for both lattice and code-based cryptography.  ...  [5] , proposed distributed ledger cryptography and digital signatures with PQC.  ... 
doi:10.3390/app11062801 fatcat:qiz5udgplzdzxj7o3gk3le56hq

Compact Dilithium Implementations on Cortex-M3 and Cortex-M4

Denisa O. C. Greconici, Matthias J. Kannwischer, Daan Sprenkels
2020 Transactions on Cryptographic Hardware and Embedded Systems  
We present implementations of the lattice-based digital signature scheme Dilithium for ARM Cortex-M3 and ARM Cortex-M4.  ...  As an additional output of this work, we present the first Cortex-M3 implementations of the key-encapsulation schemes NewHope and Kyber.  ...  Acknowledgements This work has been supported by the European Commission through the ERC Starting Grant 805031 (EPOQUE).  ... 
doi:10.46586/tches.v2021.i1.1-24 fatcat:kzlbjzxvojdmzl5cnqcqtf6vam
« Previous Showing results 1 — 15 out of 39 results