Preprint Article Version 1 This version is not peer-reviewed

Quantum Security of A Compact Multi-Signature

Version 1 : Received: 29 August 2024 / Approved: 29 August 2024 / Online: 30 August 2024 (10:54:05 CEST)

How to cite: Jiang, S. Quantum Security of A Compact Multi-Signature. Preprints 2024, 2024082138. https://doi.org/10.20944/preprints202408.2138.v1 Jiang, S. Quantum Security of A Compact Multi-Signature. Preprints 2024, 2024082138. https://doi.org/10.20944/preprints202408.2138.v1

Abstract

With the rapid advance in quantum computing, quantum security is now an indispensable property for any cryptographic system. In this paper, we study how to prove the security of a complex cryptographic system in the quantum random oracle model. We first give a variant of Zhandry’s compressed quantum random oracle (CStO), called compressed quantum random oracle with adaptive special points (CStOs). Then, we extend the on-line extraction technique of Don et al (EUROCRYPT’22) from CStO to CStOs. We also extend the random experiment technique of Liu and Zhandry (CRYPTO’19) for extracting the CStO query that witnesses the future adversarial output. With these preparations, a systematic security proof in the quantum random oracle model can start with a random CStO experiment (that extracts the witness for the future adversarial output) and then convert this game to one involving CStOs. Next, the on-line extraction technique for CStOs can be applied to extract the witness for any on-line commitment. With this strategy, we give a security proof of our recent compact multi-signature framework that is converted from any weakly secure linear ID scheme. We also prove the quantum security of our recent lattice realization of this linear ID scheme, by iteratively applying the weakly collapsing protocol technique of Liu and Zhandry (CRYPTO 2019). Combining these two results, we obtain the first quantum security proof for a compact multi-signature.

Keywords

Compressed quantum random oracle; ring-LWE; multi-signature; identification scheme

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.