Protecting Quantum Procrastinators with Signature Lifting: A Case Study in Cryptocurrencies
- URL: http://arxiv.org/abs/2303.06754v2
- Date: Tue, 23 Jul 2024 09:55:06 GMT
- Title: Protecting Quantum Procrastinators with Signature Lifting: A Case Study in Cryptocurrencies
- Authors: Or Sattath, Shai Wyborski,
- Abstract summary: This work deals with protecting quantum procrastinators: users that failed to migrate to post-quantum cryptography in time.
We introduce a technique called signature lifting, that allows us to lift a deployed pre-quantum signature scheme satisfying a certain property to a post-quantum signature scheme that uses the same keys.
We propose a modification, based on signature lifting, that can be applied in many cryptocurrencies for securely spending pre-quantum coins in presence of quantum adversaries.
- Score: 0.15346678870160887
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Current solutions to quantum vulnerabilities of widely used cryptographic schemes involve migrating users to post-quantum schemes before quantum attacks become feasible. This work deals with protecting quantum procrastinators: users that failed to migrate to post-quantum cryptography in time. To address this problem in the context of digital signatures, we introduce a technique called signature lifting, that allows us to lift a deployed pre-quantum signature scheme satisfying a certain property to a post-quantum signature scheme that uses the same keys. Informally, the said property is that a post-quantum one-way function is used "somewhere along the way" to derive the public-key from the secret-key. Our constructions of signature lifting relies heavily on the post-quantum digital signature scheme Picnic (Chase et al., CCS'17). Our main case-study is cryptocurrencies, where this property holds in two scenarios: when the public-key is generated via a key-derivation function or when the public-key hash is posted instead of the public-key itself. We propose a modification, based on signature lifting, that can be applied in many cryptocurrencies for securely spending pre-quantum coins in presence of quantum adversaries. Our construction improves upon existing constructions in two major ways: it is not limited to pre-quantum coins whose ECDSA public-key has been kept secret (and in particular, it handles all coins that are stored in addresses generated by HD wallets), and it does not require access to post-quantum coins or using side payments to pay for posting the transaction.
Related papers
- Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - How to Sign Quantum Messages [0.0]
We introduce the concept of time-dependent (TD) signatures, where the signature of a quantum message depends on the time of signing.
We then consider the bounded quantum storage model, where adversaries are limited with respect to their quantum memories.
We show that quantum messages can be signed with information-theoretic security in this model.
arXiv Detail & Related papers (2023-04-13T08:05:19Z) - Deploying hybrid quantum-secured infrastructure for applications: When
quantum and post-quantum can work together [0.8702432681310401]
Quantum key distribution is secure against unforeseen technological developments.
Post-quantum cryptography is believed to be secure even against attacks with both classical and quantum computing technologies.
Various directions in the further development of the full-stack quantum-secured infrastructure are also indicated.
arXiv Detail & Related papers (2023-04-10T13:44:21Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - On the (Im)plausibility of Public-Key Quantum Money from
Collision-Resistant Hash Functions [6.164147034988822]
We present the first black-box separation of quantum money and cryptographic primitives.
Specifically, we show that collision-resistant hash functions cannot be used as a black-box to construct public-key quantum money schemes.
arXiv Detail & Related papers (2023-01-23T00:44:54Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z) - A Quantum Money Solution to the Blockchain Scalability Problem [3.89615163169501]
We give the first example of the use of smart contracts in a quantum setting.
We describe a simple hybrid classical-quantum payment system whose main ingredients are a classical blockchain capable of handling stateful smart contracts.
Our hybrid payment system employs quantum states as banknotes and a classical blockchain to settle disputes and to keep track of the valid serial numbers.
arXiv Detail & Related papers (2020-02-27T09:40:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.