eBiBa: A Post-Quantum Hash-Based Signature With Small Signature Size in the Continuous Communication of Large-Scale Data

被引:0
|
作者
Li, Lingyun [1 ,2 ,3 ]
Lu, Xianhui [1 ,3 ]
Wang, Kunpeng [1 ,3 ]
机构
[1] Univ Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, 89 Minzhuang Rd, Beijing 100093, Peoples R China
[2] Liaocheng Univ, Sch Comp Sci, 1 Hunan Rd, Liaocheng 252059, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, 19 Yuquan Rd, Beijing 100049, Peoples R China
来源
COMPUTER JOURNAL | 2024年 / 67卷 / 04期
基金
中国国家自然科学基金;
关键词
hash-based signature; post-quantum; hash; BiBa; few-time signature; ONE-TIME SIGNATURES; DIGITAL-SIGNATURES;
D O I
10.1093/comjnl/bxad068
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present eBiBa (enhanced BiBa), a hash-based signature scheme with the smallest possible signature size, while ensuring high feasibility and security in a specific application model. Our scheme is tailored to address the communication requirement of a large-scale public data stream continuously disseminated between two participants while ensuring data source and data integrity authentication. To achieve these goals, firstly, we optimized the classical hash tree mode into a hybrid mode to efficiently perform public key authentication and eliminate the need for an authenticated channel to transmit large amounts of data, unlike the initial BiBa-based broadcast authentication protocol. Secondly, we employed a specific tweakable hash chain function to digest a batch of messages, reducing the required conditions for post-quantum existential unforgeability under adaptive chosen message attack (EUCMA) of eBiBa to a second-pre-image-resistance-like property instead of collision resistance. This results in reduced pre-computation in both key and signature generations. Thirdly, we utilized a forward-secure pseudorandom function to achieve forward-secure of the proposed scheme. Finally, we minimize the signature size through a series of procedures. Firstly, we select BiBa few-time signature as the underlying signature scheme since it is currently the few-time hash-based signature with the smallest signature size that we are aware of; in addition, the hybrid approach we employed can also significantly reduce the signature size compared to using a hash tree solely; for the hash tree structure, we design a specific authentication path in combination with the related communication model to further minimize the signature size; finally, we optimize the authentication approach to achieve the minimum signature size in a single transmission. Our construction minimizes the signature size in the aforementioned model, achieving a compression rate of 0.017 to 0.828 based on distinct values of parameters, as compared to XMSS-256. We also demonstrated that eBiBa can achieve post-quantum forward-secure and EUCMA security.
引用
收藏
页码:1405 / 1424
页数:20
相关论文
共 50 条
  • [1] A scalable post-quantum hash-based group signature
    Shafieinejad, Masoumeh
    Esfahani, Navid Nasr
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (05) : 1061 - 1090
  • [2] A scalable post-quantum hash-based group signature
    Masoumeh Shafieinejad
    Navid Nasr Esfahani
    Designs, Codes and Cryptography, 2021, 89 : 1061 - 1090
  • [3] A hash-based post-quantum ring signature scheme for the Internet of Vehicles
    Liu, Shuanggen
    Zhou, Xiayi
    Wang, Xu An
    Yan, Zixuan
    Yan, He
    Cao, Yurui
    JOURNAL OF SYSTEMS ARCHITECTURE, 2025, 160
  • [4] Syrga2: Post-Quantum Hash-Based Signature Scheme
    Algazy, Kunbolat
    Sakan, Kairat
    Nyssanbayeva, Saule
    Lizunov, Oleg
    COMPUTATION, 2024, 12 (06)
  • [5] Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme
    Tandel, Purvi
    Nasriwala, Jitendra
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2024,
  • [6] Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations
    Fathalla, Efat
    Azab, Mohamed
    IEEE ACCESS, 2024, 12 : 175969 - 175987
  • [7] Post-Quantum Authentication in OpenSSL with Hash-Based Signatures
    Butin, Denis
    Waelde, Julian
    Buchmann, Johannes
    2017 TENTH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND UBIQUITOUS NETWORK (ICMU), 2017, : 81 - 86
  • [8] Quantum-Access Security of Hash-Based Signature Schemes
    Yuan, Quan
    Tibouchi, Mehdi
    Abe, Masayuki
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 343 - 380
  • [9] Reliable Hash Trees for Post-quantum Stateless Cryptographic Hash-based Signatures
    Mozaffari-Kermani, Mehran
    Azarderakhsh, Reza
    PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFTS), 2015, : 103 - 108
  • [10] A Hash-Based Quantum-Resistant Chameleon Signature Scheme
    Thanalakshmi, P.
    Anitha, R.
    Anbazhagan, N.
    Cho, Woong
    Joshi, Gyanendra Prasad
    Yang, Eunmok
    SENSORS, 2021, 21 (24)