Publikation: Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies
Dateien
Datum
Autor:innen
Herausgeber:innen
ISSN der Zeitschrift
Electronic ISSN
ISBN
Bibliografische Daten
Verlag
Schriftenreihe
Auflagebezeichnung
DOI (zitierfähiger Link)
Internationale Patentnummer
Angaben zur Forschungsförderung
European Union (EU): 101044770
Projekt
Open Access-Veröffentlichung
Core Facility der Universität Konstanz
Titel in einer weiteren Sprache
Publikationstyp
Publikationsstatus
Erschienen in
Zusammenfassung
Cryptocurrency networks crucially rely on digital signature schemes, which are used as an authentication mechanism for transactions. Unfortunately, most major cryptocurrencies today, including Bit-coin and Ethereum, employ signature schemes that are susceptible to quantum adversaries, i.e., an adversary with access to a quantum computer can forge signatures and thereby spend coins of honest users. In cryptocurrency networks, signature schemes are typically not executed in isolation, but within a so-called cryptographic wallet. In order to achieve security against quantum adversaries, the signature scheme and the cryptographic wallet must withstand quantum attacks.
In this work, we advance the study on post-quantum secure signature and wallet schemes. That is, we provide the first formal model for deterministic threshold wallets and we show a generic post-quantum secure construction from any post-quantum secure threshold signature scheme with rerandomizable keys. We then instantiate our construction from the isogeny-based signature scheme CSI-FiSh and we show that our instantiation significantly improves over prior work.
Zusammenfassung in einer weiteren Sprache
Fachgebiet (DDC)
Schlagwörter
Konferenz
Rezension
Zitieren
ISO 690
DAS, Poulami, Andreas ERWIG, Michael MEYER, Patrick STRUCK, 2024. Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies. ASIA CCS '24 : 19th ACM Asia Conference on Computer and Communications Security. Singapore, 1. Juli 2024 - 5. Juli 2024. In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2024, S. 522-532. ISBN 979-8-4007-0482-6. Verfügbar unter: doi: 10.1145/3634737.3657008BibTex
@inproceedings{Das2024-07Effic-71468, year={2024}, doi={10.1145/3634737.3657008}, title={Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies}, isbn={979-8-4007-0482-6}, publisher={ACM}, address={New York, NY, USA}, booktitle={Proceedings of the 19th ACM Asia Conference on Computer and Communications Security}, pages={522--532}, author={Das, Poulami and Erwig, Andreas and Meyer, Michael and Struck, Patrick} }
RDF
<rdf:RDF xmlns:dcterms="http://purl.org/dc/terms/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:void="http://rdfs.org/ns/void#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/71468"> <dc:creator>Struck, Patrick</dc:creator> <dc:creator>Das, Poulami</dc:creator> <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2024-11-27T10:30:57Z</dcterms:available> <dc:contributor>Erwig, Andreas</dc:contributor> <foaf:homepage rdf:resource="http://localhost:8080/"/> <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/> <dc:contributor>Meyer, Michael</dc:contributor> <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/> <dcterms:issued>2024-07</dcterms:issued> <bibo:uri rdf:resource="https://kops.uni-konstanz.de/handle/123456789/71468"/> <dc:creator>Meyer, Michael</dc:creator> <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2024-11-27T10:30:57Z</dc:date> <dc:language>eng</dc:language> <dc:contributor>Struck, Patrick</dc:contributor> <dcterms:abstract>Cryptocurrency networks crucially rely on digital signature schemes, which are used as an authentication mechanism for transactions. Unfortunately, most major cryptocurrencies today, including Bit-coin and Ethereum, employ signature schemes that are susceptible to quantum adversaries, i.e., an adversary with access to a quantum computer can forge signatures and thereby spend coins of honest users. In cryptocurrency networks, signature schemes are typically not executed in isolation, but within a so-called cryptographic wallet. In order to achieve security against quantum adversaries, the signature scheme and the cryptographic wallet must withstand quantum attacks. In this work, we advance the study on post-quantum secure signature and wallet schemes. That is, we provide the first formal model for deterministic threshold wallets and we show a generic post-quantum secure construction from any post-quantum secure threshold signature scheme with rerandomizable keys. We then instantiate our construction from the isogeny-based signature scheme CSI-FiSh and we show that our instantiation significantly improves over prior work.</dcterms:abstract> <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/> <dc:contributor>Das, Poulami</dc:contributor> <dc:creator>Erwig, Andreas</dc:creator> <dcterms:title>Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies</dcterms:title> </rdf:Description> </rdf:RDF>