Signing Information in the Quantum Era
- URL: http://arxiv.org/abs/2009.12118v1
- Date: Fri, 25 Sep 2020 10:44:36 GMT
- Title: Signing Information in the Quantum Era
- Authors: K. Longmate, E.M. Ball, E. Dable-Heath, and R.J. Young
- Abstract summary: We review digital signature schemes, looking at their origins and where they are under threat.
We introduce post-quantum digital schemes, which are being developed with the specific intent of mitigating against threats from quantum algorithms.
Finally, we review schemes for signing information carried on quantum channels, which promise provable security metrics.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Signatures are primarily used as a mark of authenticity, to demonstrate that
the sender of a message is who they claim to be. In the current digital age,
signatures underpin trust in the vast majority of information that we exchange,
particularly on public networks such as the internet. However, schemes for
signing digital information which are based on assumptions of computational
complexity are facing challenges from advances in mathematics, the capability
of computers, and the advent of the quantum era. Here we present a review of
digital signature schemes, looking at their origins and where they are under
threat. Next, we introduce post-quantum digital schemes, which are being
developed with the specific intent of mitigating against threats from quantum
algorithms whilst still relying on digital processes and infrastructure.
Finally, we review schemes for signing information carried on quantum channels,
which promise provable security metrics. Signatures were invented as a
practical means of authenticating communications and it is important that the
practicality of novel signature schemes is considered carefully, which is kept
as a common theme of interest throughout this review.
Related papers
- Efficient Arbitrated Quantum Digital Signature with Multi-Receiver Verification [3.6788660756664773]
Quantum digital signature is used to authenticate the identity of the signer with theoretical security.
In traditional multi-receiver quantum digital signature schemes without an arbitrater, the transferability of one-to-one signature is always required to achieve unforgeability.
We propose an arbitrated quantum digital signature scheme, in which the signature can be verified by multiple receivers simultaneously.
arXiv Detail & Related papers (2024-06-12T02:46:54Z) - An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication [1.156080039774429]
In 1984, Shamir developed the first Identity-based signature (IBS) to simplify public key infrastructure.
IBS protocols rely on several theoretical assumption-based hard problems.
Quantum cryptography (QC) is one such approach.
arXiv Detail & Related papers (2024-03-27T04:32:41Z) - Revocable Quantum Digital Signatures [57.25067425963082]
We define and construct digital signatures with revocable signing keys from the LWE assumption.
In this primitive, the signing key is a quantum state which enables a user to sign many messages.
Once the key is successfully revoked, we require that the initial recipient of the key loses the ability to sign.
arXiv Detail & Related papers (2023-12-21T04:10:07Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Entanglement-based quantum digital signatures over deployed campus
network [0.6617348612068856]
A major advantage of a quantum-digital-signatures protocol is that it can have information-theoretic security.
We demonstrate and characterize hardware to implement entanglement-based quantum digital signatures over our campus network.
arXiv Detail & Related papers (2023-10-30T11:31:23Z) - A Feasible Hybrid Quantum-Assisted Digital Signature for Arbitrary
Message Length [0.0]
We propose a new quantum-assisted digital signature protocol based on symmetric keys generated by QKD.
The protocol is described for a three-user scenario composed of one sender and two receivers.
arXiv Detail & Related papers (2023-03-01T19:00:02Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Secure access system using signature verification over tablet PC [62.21072852729544]
We describe a highly versatile and scalable prototype for Web-based secure access using signature verification.
The proposed architecture can be easily extended to work with different kinds of sensors and large-scale databases.
arXiv Detail & Related papers (2023-01-11T11:05:47Z) - An Evolutionary Pathway for the Quantum Internet Relying on Secure
Classical Repeaters [64.48099252278821]
We conceive quantum networks using secure classical repeaters combined with the quantum secure direct communication principle.
In these networks, the ciphertext gleaned from a quantum-resistant algorithm is transmitted using QSDC along the nodes.
We have presented the first experimental demonstration of a secure classical repeater based hybrid quantum network.
arXiv Detail & Related papers (2022-02-08T03:24:06Z) - A Survey on Code-Based Cryptography [0.40964539027092917]
A capable quantum computer can break all currently employed asymmetric cryptosystems.
NIST has initiated in 2016 a standardization process for public-key encryption (PKE) schemes, key-encapsulation mechanisms (KEM) and digital signature schemes.
In 2023, NIST made an additional call for post-quantum signatures.
arXiv Detail & Related papers (2022-01-18T16:46:42Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.