Revocable Quantum Digital Signatures
- URL: http://arxiv.org/abs/2312.13561v1
- Date: Thu, 21 Dec 2023 04:10:07 GMT
- Title: Revocable Quantum Digital Signatures
- Authors: Tomoyuki Morimae and Alexander Poremba and Takashi Yamakawa
- Abstract summary: We define and construct digital signatures with revocable signing keys from the LWE assumption.
In this primitive, the signing key is a quantum state which enables a user to sign many messages.
Once the key is successfully revoked, we require that the initial recipient of the key loses the ability to sign.
- Score: 57.25067425963082
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We study digital signatures with revocation capabilities and show two
results. First, we define and construct digital signatures with revocable
signing keys from the LWE assumption. In this primitive, the signing key is a
quantum state which enables a user to sign many messages and yet, the quantum
key is also revocable, i.e., it can be collapsed into a classical certificate
which can later be verified. Once the key is successfully revoked, we require
that the initial recipient of the key loses the ability to sign. We construct
digital signatures with revocable signing keys from a newly introduced
primitive which we call two-tier one-shot signatures, which may be of
independent interest. This is a variant of one-shot signatures, where the
verification of a signature for the message ``0'' is done publicly, whereas the
verification for the message ``1'' is done in private. We give a construction
of two-tier one-shot signatures from the LWE assumption. As a complementary
result, we also construct digital signatures with quantum revocation from group
actions, where the quantum signing key is simply ``returned'' and then verified
as part of revocation.
Second, we define and construct digital signatures with revocable signatures
from OWFs. In this primitive, the signer can produce quantum signatures which
can later be revoked. Here, the security property requires that, once
revocation is successful, the initial recipient of the signature loses the
ability to find accepting inputs to the signature verification algorithm. We
construct this primitive using a newly introduced two-tier variant of tokenized
signatures. For the construction, we show a new lemma which we call the
adaptive hardcore bit property for OWFs, which may enable further applications.
Related papers
- An Undeniable Signature Scheme Utilizing Module Lattices [0.0]
An undeniable signature scheme is type of digital signature where the signer retains control over the signature's verifiability.
We develop a module lattice-based post-quantum undeniable signature system.
arXiv Detail & Related papers (2024-10-25T00:09:29Z) - Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a brand new quantum digital signature protocol without a trusted third party only with qubit technology to further improve the security.
We prove that the protocol has information-theoretical unforgeability. Moreover, it satisfies other important secure properties, including asymmetry, undeniability, and expandability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - Investigating the Common Authorship of Signatures by Off-Line Automatic Signature Verification Without the Use of Reference Signatures [3.3498759480099856]
This paper addresses the problem of automatic signature verification when no reference signatures are available.
The scenario we explore consists of a set of signatures, which could be signed by the same author or by multiple signers.
We discuss three methods which estimate automatically the common authorship of a set of off-line signatures.
arXiv Detail & Related papers (2024-05-23T10:30:48Z) - FedSOV: Federated Model Secure Ownership Verification with Unforgeable
Signature [60.99054146321459]
Federated learning allows multiple parties to collaborate in learning a global model without revealing private data.
We propose a cryptographic signature-based federated learning model ownership verification scheme named FedSOV.
arXiv Detail & Related papers (2023-05-10T12:10:02Z) - How to Sign Quantum Messages [0.0]
We introduce the concept of time-dependent (TD) signatures, where the signature of a quantum message depends on the time of signing.
We then consider the bounded quantum storage model, where adversaries are limited with respect to their quantum memories.
We show that quantum messages can be signed with information-theoretic security in this model.
arXiv Detail & Related papers (2023-04-13T08:05:19Z) - Secure access system using signature verification over tablet PC [62.21072852729544]
We describe a highly versatile and scalable prototype for Web-based secure access using signature verification.
The proposed architecture can be easily extended to work with different kinds of sensors and large-scale databases.
arXiv Detail & Related papers (2023-01-11T11:05:47Z) - Quotable Signatures for Authenticating Shared Quotes [0.8875650122536799]
Quotable signature schemes are digital signature schemes with the additional property that from the signature for a message, any party can extract signatures for (allowable) quotes from the message.
We define a notion of security for quotable signature schemes and construct a concrete example of a quotable signature scheme.
We consider both how quotable signatures can be used, and why using them could help mitigate the effects of fake news.
arXiv Detail & Related papers (2022-12-21T12:07:46Z) - Label Semantics for Few Shot Named Entity Recognition [68.01364012546402]
We study the problem of few shot learning for named entity recognition.
We leverage the semantic information in the names of the labels as a way of giving the model additional signal and enriched priors.
Our model learns to match the representations of named entities computed by the first encoder with label representations computed by the second encoder.
arXiv Detail & Related papers (2022-03-16T23:21:05Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - A Note on the Post-Quantum Security of (Ring) Signatures [17.284592769143075]
This work revisits the security of classical signatures and ring signatures in a quantum world.
We focus on the arguably preferable security notion of blind-unforgeability recently proposed by Alagic et al.
We present two short signature schemes achieving this notion.
arXiv Detail & Related papers (2021-12-11T21:51:41Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.