posted on 2024-07-15, 08:39authored byPoulami Das, Andreas Erwig, Michael Meyer, Patrick Struck
Cryptocurrency networks crucially rely on digital signature schemes, which are used as an authentication mechanism for transactions. Unfortunately, most major cryptocurrencies today, including Bit-coin and Ethereum, employ signature schemes that are susceptible to quantum adversaries, i.e., an adversary with access to a quantum computer can forge signatures and thereby spend coins of honest users. In cryptocurrency networks, signature schemes are typically not executed in isolation, but within a so-called cryptographic wallet. In order to achieve security against quantum adversaries, the signature scheme and the cryptographic wallet must withstand quantum attacks.
In this work, we advance the study on post-quantum secure signature and wallet schemes. That is, we provide the first formal model for deterministic threshold wallets and we show a generic post-quantum secure construction from any post-quantum secure threshold signature scheme with rerandomizable keys. We then instantiate our construction from the isogeny-based signature scheme CSI-FiSh and we show that our instantiation significantly improves over prior work.
History
Primary Research Area
Algorithmic Foundations and Cryptography
Name of Conference
ACM ASIA Conference on Computer and Communications Security (AsiaCCS)
Page Range
522-532
Publisher
Association for Computing Machinery (ACM)
Open Access Type
Green
BibTeX
@conference{Das:Erwig:Meyer:Struck:2024,
title = "Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies",
author = "Das, Poulami" AND "Erwig, Andreas" AND "Meyer, Michael" AND "Struck, Patrick",
year = 2024,
month = 7,
pages = "522--532",
publisher = "Association for Computing Machinery (ACM)",
doi = "10.1145/3634737.3657008"
}