Threshold Ring Signatures: New Security Definitions and Post-Quantum - - PowerPoint PPT Presentation

threshold ring signatures new security definitions and
SMART_READER_LITE
LIVE PREVIEW

Threshold Ring Signatures: New Security Definitions and Post-Quantum - - PowerPoint PPT Presentation

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Threshold Ring Signatures: New Security Definitions and Post-Quantum Security Abida Haque , Alessandra Scafuro North Carolina State University May


slide-1
SLIDE 1

Problem Description Current State of the Art Our Contribution Our Scheme Summary References

Threshold Ring Signatures: New Security Definitions and Post-Quantum Security

Abida Haque, Alessandra Scafuro

North Carolina State University

May 25, 2020

1 / 51

slide-2
SLIDE 2

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Threshold Ring Signature

Problem Description

2 / 51

slide-3
SLIDE 3

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Threshold Ring Signature

Threshold Ring Signature

Main Definitions

Threshold ring signatures: t distinct parties anonymously sign

  • n behalf of a ring of N public keys. The identity of the signers

remains private (to any non-signers).

3 / 51

slide-4
SLIDE 4

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Threshold Ring Signature

Threshold Ring Signature

Signature

Signer σ ← Signsk(msg) Verifier msg, σ

unforgeability

4 / 51

slide-5
SLIDE 5

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Threshold Ring Signature

Threshold Ring Signature

Ring Signature

Ring: Signer Non-signers σ ← Signsk(msg; R) Verifier msg, σ, R

unforgeability anonymity

5 / 51

slide-6
SLIDE 6

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Threshold Ring Signature

Threshold Ring Signature

Ring Signature

Ring: Signers Non-signers σ ← Signski,skj (msg; R) Verifier msg, σ, R

unforgeability anonymity threshold

6 / 51

slide-7
SLIDE 7

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Threshold Ring Signature

Motivation

Increased tolerance to misbehavior of users Suits decentralized settings Settings where you need a quorum.

Fund A: 2-of-5 votes Fund B: 2-of-5 votes Fund B: 3-of-5 votes

an ad-hoc "voting" mechanism for community projects posted on the blockchain Funds: $$$

7 / 51

slide-8
SLIDE 8

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Weak Security Definitions Post-Quantum Security

Current State of the Art

8 / 51

slide-9
SLIDE 9

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Weak Security Definitions Post-Quantum Security

State of the Art

Passive Security Definitions Post-Quantum Insecure

1 Hardness

Assumptions

2 Techniques 9 / 51

slide-10
SLIDE 10

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Weak Security Definitions Post-Quantum Security

Threshold Ring Signature Setting

Ad-hoc settings where the users can generate their keys independently, and join or leave the system at any time. Users could join the system with dishonestly generated keys.

10 / 51

slide-11
SLIDE 11

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Weak Security Definitions Post-Quantum Security

Passive Adversaries

Only passive adversaries. Adversaries can only obtain honestly generated keys. Sometimes cannot even choose to add more (honest) keys (e.g., Bettaieb and Schrek (2013); Petzoldt et al. (2013)), Adversaries cannot corrupt parties (e.g. Okamoto et al. (2018); Petzoldt et al. (2013); Bettaieb and Schrek (2013)). Bender et al. (2006) observe that the above doesn’t reflect the open settings of ring signatures.

11 / 51

slide-12
SLIDE 12

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Weak Security Definitions Post-Quantum Security

State of the Art

Passive Security Definitions

1 passive adversaries 2 no corruption 3 no adding of new honest keys

Post-Quantum Insecure

1 Hardness

Assumptions

2 Techniques 12 / 51

slide-13
SLIDE 13

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Weak Security Definitions Post-Quantum Security

Post-Quantum Hardness Assumptions

Discrete log, factoring hardness assumptions are not secure against an attack from a quantum computer (Shor (1994)). Some constructions Melchor et al. (2011); Bettaieb and Schrek (2013); Cayrel et al. (2010); Petzoldt et al. (2013) use post-quantum secure hardness problems such as lattices

  • r learning-with-errors.

13 / 51

slide-14
SLIDE 14

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Weak Security Definitions Post-Quantum Security

State of the Art

Passive Security Definitions

1 passive adversaries 2 no corruption 3 no adding of new honest keys

Post-Quantum Insecure

1 Non-PQ secure

problems

2 Techniques 14 / 51

slide-15
SLIDE 15

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Weak Security Definitions Post-Quantum Security

Proof Techniques in Post-Quantum Setting

Transform from Fiat and Shamir (1986) common, but security may not hold in the quantum setting (Boneh et al. (2011); Ambainis et al. (2014)). Quantum rewinding is not trivial (Watrous (2009); Ambainis et al. (2014)). Fiat-Shamir is post-quantum secure in certain situations (Liu and Zhandry (2019); Don et al. (2019)) but may not hold in general.

15 / 51

slide-16
SLIDE 16

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Weak Security Definitions Post-Quantum Security

Transformation

Signer Verifier Signer Verifier

Figure: Transform an interactive protocol into a non-interactive one.

16 / 51

slide-17
SLIDE 17

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Weak Security Definitions Post-Quantum Security

Rewinding

Signer Verifier

Figure: Prove scheme with

  • rewinding. But a

quantum adversary may notice!

17 / 51

slide-18
SLIDE 18

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Weak Security Definitions Post-Quantum Security

Quantum vs Classical Access

Classical

On a single query, can only get a single response.

Query Response

18 / 51

slide-19
SLIDE 19

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Weak Security Definitions Post-Quantum Security

Quantum vs Classical Access

Quantum

Can get a superposition of answers.

|Query> |Response>

Can define all possible outputs using only a single query. This is why we use Unruh.

19 / 51

slide-20
SLIDE 20

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Weak Security Definitions Post-Quantum Security

State of the Art

Passive Security Definitions

1 passive adversaries 2 no corruption 3 no adding of new honest keys

Post-Quantum Insecure

1 Non-PQ secure

problems

2 Fiat-Shamir is not

PQ-secure in general.

20 / 51

slide-21
SLIDE 21

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Definitions Post-Quantum Security

Our Contribution

21 / 51

slide-22
SLIDE 22

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Definitions Post-Quantum Security

Our Contribution

1 Definitions for unforgeability and

anonymity with active adversaries.

2 Post-quantum secure proof for a threshold

ring signature.

1 generalize previous approaches and

provide a black-box construction from any (post-quantum) trapdoor commitment scheme.

2 Uses Unruh Transformation to guarantee

post-quantum security.

22 / 51

slide-23
SLIDE 23

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Definitions Post-Quantum Security

Definitions

Make a security model by giving adversary access to oracles. Captures active adversaries. Two security notions: unforgeability and anonymity.

23 / 51

slide-24
SLIDE 24

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Definitions Post-Quantum Security

Anonymity and Unforgeability

KGen Sign Corrupt Register Training: ask queries

Anonymity: A picks: message S0, S1 with respect to a ring R, where |S0| = |S1| = t. A receives a signature from Sb (b = 0 or 1) and guesses b. S0, S1 uncorrupted. Unforgeability: A produces message signature ring Fewer than t corrupted members in R∗.

24 / 51

slide-25
SLIDE 25

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Definitions Post-Quantum Security

Anonymity and Unforgeability

KGen Sign Corrupt Register Training: ask queries

Anonymity: A picks: message S0, S1 with respect to a ring R, where |S0| = |S1| = t. A receives a signature from Sb (b = 0 or 1) and guesses b. S0, S1 uncorrupted. Unforgeability: A produces message signature ring Fewer than t corrupted members in R∗.

24 / 51

slide-26
SLIDE 26

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Definitions Post-Quantum Security

Anonymity and Unforgeability

KGen Sign Corrupt Register Training: ask queries

Anonymity: A picks: message S0, S1 with respect to a ring R, where |S0| = |S1| = t. A receives a signature from Sb (b = 0 or 1) and guesses b. S0, S1 uncorrupted. Unforgeability: A produces message signature ring Fewer than t corrupted members in R∗.

24 / 51

slide-27
SLIDE 27

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Definitions Post-Quantum Security

Oracles

Key Generation: Upon query from A, the oracle creates private-public key pair and gives the public key to A. Sign: A requests a signature on message and signers w.r.t. a ring. The oracle follows the signing algorithm with the secret keys that he controls. A must participate in the signing procedure if there are corrupted members. Corrupt: Oracle returns requested user’s secret key to A and updates list of corrupted users. Register: A provides public key to the oracle, who adds it to the ring and list of corrupted ring members.

25 / 51

slide-28
SLIDE 28

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Definitions Post-Quantum Security

Our Contribution

1 Definitions for unforgeability and

anonymity with active adversaries.

2 Post-quantum secure proof for a threshold

ring signature.

1 generalize previous approaches and

provide a black-box construction from any (post-quantum) trapdoor commitment scheme.

2 Uses Unruh Transformation to guarantee

post-quantum security.

26 / 51

slide-29
SLIDE 29

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Definitions Post-Quantum Security

Post-Quantum Secure Problem and Technique

Black-box use of (post-quantum) Trapdoor Commitment Scheme We avoid rewinding by making all outputs part of the signature (Unruh (2015)).

27 / 51

slide-30
SLIDE 30

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Our Scheme

28 / 51

slide-31
SLIDE 31

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Commitment Scheme

Hiding, Binding

Sender can commit to a message. Receiver cannot learn what the message is (hiding). Later sender can only open to the

  • riginal message (binding).

29 / 51

slide-32
SLIDE 32

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Commitment Scheme

Hiding, Binding

Sender can commit to a message. Receiver cannot learn what the message is (hiding). Later sender can only open to the

  • riginal message (binding).

30 / 51

slide-33
SLIDE 33

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Trapdoor

Knowing a trapdoor, it’s possible to ‘change your mind’.

31 / 51

slide-34
SLIDE 34

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Trapdoor Commitment Scheme

Trapdoor Indistinguishability

With knowledge of a trapdoor t, sender can open a commitment to any message they like. Hiding, binding (w/o knowledge of trapdoor), and trapdoor indistinguishability.

32 / 51

slide-35
SLIDE 35

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Trapdoor Commitment Scheme

Trapdoor Indistinguishability

With knowledge of a trapdoor t, sender can open a commitment to any message they like. Hiding, binding (w/o knowledge of trapdoor), and trapdoor indistinguishability.

33 / 51

slide-36
SLIDE 36

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Shamir Secret Sharing

Graphic

Example: Want 3-out-of-5.

Secret: z y = ax2 + bx + z (x1, y1) (x2, y2) (x3, y3) (x4, y4) (x5, y5) Combine points to uniquely create z

Description 34 / 51

slide-37
SLIDE 37

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Shamir Secret Sharing

Graphic

Example: Want 3-out-of-5.

Secret: z y = ax2 + bx + z (x1, y1) (x2, y2) (x3, y3) (x4, y4) (x5, y5) Combine points to uniquely create z

Description 34 / 51

slide-38
SLIDE 38

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Shamir Secret Sharing

Graphic

Example: Want 3-out-of-5.

Secret: z y = ax2 + bx + z (x1, y1) (x2, y2) (x3, y3) (x4, y4) (x5, y5) Combine points to uniquely create z

Description 34 / 51

slide-39
SLIDE 39

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Shamir Secret Sharing

Graphic

Example: Want 3-out-of-5.

(x1, y1) (x2, y2) (x3, y3) (x4, y4) (x5, y5) Secret: z 2 points is not enough for a quadratic

Description 35 / 51

slide-40
SLIDE 40

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Shamir Secret Sharing

With 2 points there are lots of solutions to the quadratic polynomial. By adding the third point we uniquely define the polynomial.

36 / 51

slide-41
SLIDE 41

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Protocol

Ring Members

For a 3-out-of-5 threshold ring signature:

(vk1, sk1), (vk2, sk2), (vk3, sk3) vk4 vk5

Where vks = (pks, xs).

37 / 51

slide-42
SLIDE 42

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Template

Signer cs ← TCom(sks) Non-signer (pkq, ?) cq, opq ← Compkq(yq) com = c1 c2 c3 c4 c5 H msg, com z Verifier com, {(yi, opi)}5

i=1 Unruh 38 / 51

slide-43
SLIDE 43

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Template

Signer cs ← TCom(sks) Non-signer (pkq, ?) cq, opq ← Compkq(yq) com = c1 c2 c3 c4 c5 H msg, com z Verifier com, {(yi, opi)}5

i=1 Unruh 38 / 51

slide-44
SLIDE 44

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Template

Signer cs ← TCom(sks) Non-signer (pkq, ?) cq, opq ← Compkq(yq) com = c1 c2 c3 c4 c5 H msg, com z Verifier com, {(yi, opi)}5

i=1 Unruh 38 / 51

slide-45
SLIDE 45

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Template

Signer cs ← TCom(sks) Non-signer (pkq, ?) cq, opq ← Compkq(yq) com = c1 c2 c3 c4 c5 H msg, com z Verifier com, {(yi, opi)}5

i=1 Unruh 38 / 51

slide-46
SLIDE 46

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Template

Signer cs ← TCom(sks) Non-signer (pkq, ?) cq, opq ← Compkq(yq) com = c1 c2 c3 c4 c5 H msg, com z Verifier com, {(yi, opi)}5

i=1 Unruh 38 / 51

slide-47
SLIDE 47

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Template

Signer cs ← TCom(sks) Non-signer (pkq, ?) cq, opq ← Compkq(yq) com = c1 c2 c3 c4 c5 H msg, com z Verifier com, {(yi, opi)}5

i=1 Unruh 38 / 51

slide-48
SLIDE 48

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Core Technique

Swap every trapdoor commitment out with an honest commitment step-by-step. At the end signers and non-signers look perfectly alike!

39 / 51

slide-49
SLIDE 49

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Anonymity

With all honest trapdoors two signatures look exactly alike. Replacing a trapdoor commitment with an honest commitment is indistinguishable.

40 / 51

slide-50
SLIDE 50

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Unforgeability

With all honest commitments use a forgery to break binding.

com = c1 c2 c3 c4 c5 H msg, com z z′ com, {(yi, opi)}5

i=1

{(y′i, op′i)}5

i=1 41 / 51

slide-51
SLIDE 51

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Unruh Transformation

H P Prover Extractor H−1 witness

proof x H(x) x

make the RO invertible include all outputs in the proof

42 / 51

slide-52
SLIDE 52

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Unruh Transformation

com1 comi comn c1

1

. . . cN

1

. . . ... . . . c1

i

. . . cN

i

. . . ... . . . c1

n

. . . cN

n

Commitments Verifier can see all commitments for each i What openings verifier can see for σi i y1

i,1

. . . yN

i,1

. . . ... . . . y1

i,Ji . . .

yN

i,Ji

. . . ... . . . y1

i,m . . .

yN

i,m

Inputs to commitments

  • p1

i,1

. . .

  • pN

i,1

. . . ... . . .

  • p1

i,Ji . . . opN i,Ji

. . . ... . . .

  • p1

i,m . . .

  • pN

i,m

Opening Information r1

i,1

. . . rN

i,1

. . . ... . . . r1

i,Ji

. . . rN

i,Ji

. . . ... . . . r1

i,m

. . . rN

i,m

Randomness g1

i,1

. . . gN

i,1

. . . ... . . . g1

i,Ji

. . . gN

i,Ji

. . . ... . . . g1

i,m . . .

gN

i,m

Hash invertibly

Instead of making a single commitment, make n commitments and answer m challenges.

1 43 / 51

slide-53
SLIDE 53

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Unruh Transformation

com1 comi comn c1

1

. . . cN

1

. . . ... . . . c1

i

. . . cN

i

. . . ... . . . c1

n

. . . cN

n

Commitments Verifier can see all commitments for each i What openings verifier can see for σi i y1

i,1

. . . yN

i,1

. . . ... . . . y1

i,Ji . . .

yN

i,Ji

. . . ... . . . y1

i,m . . .

yN

i,m

Inputs to commitments

  • p1

i,1

. . .

  • pN

i,1

. . . ... . . .

  • p1

i,Ji . . . opN i,Ji

. . . ... . . .

  • p1

i,m . . .

  • pN

i,m

Opening Information r1

i,1

. . . rN

i,1

. . . ... . . . r1

i,Ji

. . . rN

i,Ji

. . . ... . . . r1

i,m

. . . rN

i,m

Randomness g1

i,1

. . . gN

i,1

. . . ... . . . g1

i,Ji

. . . gN

i,Ji

. . . ... . . . g1

i,m . . .

gN

i,m

Hash invertibly

Instead of making a single commitment, make n commitments and answer m challenges.

1 43 / 51

slide-54
SLIDE 54

Problem Description Current State of the Art Our Contribution Our Scheme Summary References Building Blocks Overview of Scheme Overview of Security

Unforgeability

g1

i,1

. . . gN

i,1

. . . ... . . . g1

i,Ji

. . . gN

i,Ji

. . . ... . . . g1

i,m

. . . gN

i,m

W.h.p. 2 commitments have 2 valid responses.

44 / 51

slide-55
SLIDE 55

Problem Description Current State of the Art Our Contribution Our Scheme Summary References

Summary

45 / 51

slide-56
SLIDE 56

Problem Description Current State of the Art Our Contribution Our Scheme Summary References

Summary

1 First formal definitions for a t-out-of-N threshold ring

signature scheme in the presence of active adversaries that leverage malicious keys in their attacks. Generalized the definitions of Bender et al. (2006) from 1-out-of-N ring signatures to threshold t-out-of-N ring signatures.

2 Created a scheme which uses black-box trapdoor

commitments, meaning that the parties can use any (post-quantum) trapdoor commitment scheme.

3 First construction that is provably secure against quantum

adversaries that have quantum access to the random oracle.

46 / 51

slide-57
SLIDE 57

Problem Description Current State of the Art Our Contribution Our Scheme Summary References

Questions for Future Research

Can we use Fiat-Shamir for thring signatures in a way that’s provably post-quantum secure? Can we make a post-quantum secure thring signature which has anonymity amongst signers?

47 / 51

slide-58
SLIDE 58

Problem Description Current State of the Art Our Contribution Our Scheme Summary References

The End

https://eprint.iacr.org/2020/135

48 / 51

slide-59
SLIDE 59

Problem Description Current State of the Art Our Contribution Our Scheme Summary References

Bibliography I

Ambainis, A., Rosmanis, A., and Unruh, D. (2014). Quantum attacks on classical proof systems: The hardness of quantum rewinding. In Foundations of Computer Science (FOCS), 2014 IEEE 55th Annual Symposium on, pages 474–483. IEEE. Bender, A., Katz, J., and Morselli, R. (2006). Ring signatures: Stronger definitions, and constructions without random oracles. In Theory of Cryptography Conference, pages 60–79. Springer. Bettaieb, S. and Schrek, J. (2013). Improved lattice-based threshold ring signature

  • scheme. In International Workshop on Post-Quantum Cryptography, pages

34–51. Springer. Boneh, D., Dagdelen, Ö., Fischlin, M., Lehmann, A., Schaffner, C., and Zhandry,

  • M. (2011). Random oracles in a quantum world. In International Conference
  • n the Theory and Application of Cryptology and Information Security, pages

41–69. Springer. Cayrel, P.-L., Lindner, R., Rückert, M., and Silva, R. (2010). A lattice-based threshold ring signature scheme. In International Conference on Cryptology and Information Security in Latin America, pages 255–272. Springer.

49 / 51

slide-60
SLIDE 60

Problem Description Current State of the Art Our Contribution Our Scheme Summary References

Bibliography II

Don, J., Fehr, S., Majenz, C., and Schaffner, C. (2019). Security of the fiat-shamir transformation in the quantum random-oracle model. Cryptology ePrint Archive, Report 2019/190. https://eprint.iacr.org/2019/190. Fiat, A. and Shamir, A. (1986). How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology, CRYPTO 86, pages 186–194. Springer. Liu, Q. and Zhandry, M. (2019). Revisiting post-quantum fiat-shamir. Cryptology ePrint Archive, Report 2019/262. https://eprint.iacr.org/2019/262. Melchor, C. A., Cayrel, P.-L., Gaborit, P., and Laguillaumie, F. (2011). A new efficient threshold ring signature scheme based on coding theory. IEEE Transactions on Information Theory, 57(7):4833–4842. Okamoto, T., Tso, R., Yamaguchi, M., and Okamoto, E. (2018). A k-out-of-n ring signature with flexible participation for signers. IACR Cryptology ePrint Archive, 2018:728. Petzoldt, A., Bulygin, S., and Buchmann, J. (2013). A multivariate based threshold ring signature scheme. Applicable Algebra in Engineering, Communication and Computing, 24(3-4):255–275.

50 / 51

slide-61
SLIDE 61

Problem Description Current State of the Art Our Contribution Our Scheme Summary References

Bibliography III

Shor, P. W. (1994). Polynomial time algorithms for discrete logarithms and factoring on a quantum computer. In International Algorithmic Number Theory Symposium, pages 289–289. Springer. Unruh, D. (2015). Non-interactive zero-knowledge proofs in the quantum random

  • racle model. In Annual International Conference on the Theory and

Applications of Cryptographic Techniques, pages 755–784. Springer. Watrous, J. (2009). Zero-knowledge against quantum attacks. SIAM Journal on Computing, 39(1):25–58.

51 / 51