Signing Information in the Quantum Era
- URL: http://arxiv.org/abs/2009.12118v1
- Date: Fri, 25 Sep 2020 10:44:36 GMT
- Title: Signing Information in the Quantum Era
- Authors: K. Longmate, E.M. Ball, E. Dable-Heath, and R.J. Young
- Abstract summary: We review digital signature schemes, looking at their origins and where they are under threat.
We introduce post-quantum digital schemes, which are being developed with the specific intent of mitigating against threats from quantum algorithms.
Finally, we review schemes for signing information carried on quantum channels, which promise provable security metrics.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Signatures are primarily used as a mark of authenticity, to demonstrate that
the sender of a message is who they claim to be. In the current digital age,
signatures underpin trust in the vast majority of information that we exchange,
particularly on public networks such as the internet. However, schemes for
signing digital information which are based on assumptions of computational
complexity are facing challenges from advances in mathematics, the capability
of computers, and the advent of the quantum era. Here we present a review of
digital signature schemes, looking at their origins and where they are under
threat. Next, we introduce post-quantum digital schemes, which are being
developed with the specific intent of mitigating against threats from quantum
algorithms whilst still relying on digital processes and infrastructure.
Finally, we review schemes for signing information carried on quantum channels,
which promise provable security metrics. Signatures were invented as a
practical means of authenticating communications and it is important that the
practicality of novel signature schemes is considered carefully, which is kept
as a common theme of interest throughout this review.
Related papers
- Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a brand new quantum digital signature protocol without a trusted third party only with qubit technology to further improve the security.
We prove that the protocol has information-theoretical unforgeability. Moreover, it satisfies other important secure properties, including asymmetry, undeniability, and expandability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Efficient Arbitrated Quantum Digital Signature with Multi-Receiver Verification [3.6788660756664773]
Quantum digital signature is used to authenticate the identity of the signer with theoretical security.
In traditional multi-receiver quantum digital signature schemes without an arbitrater, the transferability of one-to-one signature is always required to achieve unforgeability.
We propose an arbitrated quantum digital signature scheme, in which the signature can be verified by multiple receivers simultaneously.
arXiv Detail & Related papers (2024-06-12T02:46:54Z) - An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication [1.156080039774429]
In 1984, Shamir developed the first Identity-based signature (IBS) to simplify public key infrastructure.
IBS protocols rely on several theoretical assumption-based hard problems.
Quantum cryptography (QC) is one such approach.
arXiv Detail & Related papers (2024-03-27T04:32:41Z) - Revocable Quantum Digital Signatures [57.25067425963082]
We define and construct digital signatures with revocable signing keys from the LWE assumption.
In this primitive, the signing key is a quantum state which enables a user to sign many messages.
Once the key is successfully revoked, we require that the initial recipient of the key loses the ability to sign.
arXiv Detail & Related papers (2023-12-21T04:10:07Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Entanglement-based quantum digital signatures over deployed campus
network [0.6617348612068856]
A major advantage of a quantum-digital-signatures protocol is that it can have information-theoretic security.
We demonstrate and characterize hardware to implement entanglement-based quantum digital signatures over our campus network.
arXiv Detail & Related papers (2023-10-30T11:31:23Z) - An Evolutionary Pathway for the Quantum Internet Relying on Secure
Classical Repeaters [64.48099252278821]
We conceive quantum networks using secure classical repeaters combined with the quantum secure direct communication principle.
In these networks, the ciphertext gleaned from a quantum-resistant algorithm is transmitted using QSDC along the nodes.
We have presented the first experimental demonstration of a secure classical repeater based hybrid quantum network.
arXiv Detail & Related papers (2022-02-08T03:24:06Z) - A Survey on Code-Based Cryptography [0.40964539027092917]
A capable quantum computer can break all currently employed asymmetric cryptosystems.
NIST has initiated in 2016 a standardization process for public-key encryption (PKE) schemes, key-encapsulation mechanisms (KEM) and digital signature schemes.
In 2023, NIST made an additional call for post-quantum signatures.
arXiv Detail & Related papers (2022-01-18T16:46:42Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.