Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Making Classical (Threshold) Signatures Post-quantum for Single Use on a Public Ledger
 
conference paper

Making Classical (Threshold) Signatures Post-quantum for Single Use on a Public Ledger

Marco, Laurane  
•
Talayhan, Abdullah  
•
Vaudenay, Serge  
Shikata, Junji
•
Kuzono, Hiroki
2023
Advances in Information and Computer Security: 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29–31, 2023, Proceedings
The 18th International Workshop on Security (IWSEC 2023)

The Bitcoin architecture heavily relies on the ECDSA signature scheme which is broken by quantum adversaries as the secret key can be computed from the public key in quantum polynomial time. To mitigate this attack, bitcoins can be paid to the hash of a public key (P2PKH). However, the first payment reveals the public key so all bitcoins attached to it must be spent at the same time (i.e. the remaining amount must be transferred to a new wallet). Some problems remain with this approach: the owners are vulnerable against rushing adversaries between the time the signature is made public and the time it is committed to the blockchain. Additionally, there is no equivalent mechanism for threshold signatures. Finally, no formal analysis of P2PKH has been done. In this paper, we formalize the security notion of a digital signature with a hidden public key and we propose and prove the security of a generic transformation that converts a classical signature to a post-quantum one that can be used only once. We compare it with P2PKH. Namely, our proposal relies on pre-image resistance instead of collision resistance as for P2PKH, so allows for shorter hashes. Additionally, we propose the notion of a delay signature to address the problem of the rushing adversary when used with a public ledger and discuss the advantages and disadvantages of our approach. We further extend our results to threshold signatures.

  • Files
  • Details
  • Metrics
Type
conference paper
Author(s)
Marco, Laurane  
•
Talayhan, Abdullah  
•
Vaudenay, Serge  
Editors
Shikata, Junji
•
Kuzono, Hiroki
Date Issued

2023

Published in
Advances in Information and Computer Security: 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29–31, 2023, Proceedings
ISBN of the book

9783031413254

Series title/Series vol.

Lecture Notes in Computer Science; 14128

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LASEC  
Event nameEvent placeEvent date
The 18th International Workshop on Security (IWSEC 2023)

Yokohama, Japan

August 29-31, 2023

Available on Infoscience
August 31, 2023
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/200332
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés