Quantum Oracle Distribution Switching and its Applications to Fully Anonymous Ring Signatures
- URL: http://arxiv.org/abs/2602.16268v1
- Date: Wed, 18 Feb 2026 08:41:04 GMT
- Title: Quantum Oracle Distribution Switching and its Applications to Fully Anonymous Ring Signatures
- Authors: Marvin Beckmann, Christian Majenz,
- Abstract summary: Ring signature constructions from post-quantum assumptions offer suitable security and efficiency for use in deniable key exchange.<n>We provide four security reductions in the quantum-accessible random oracle model (QROM) for two generic ring signature constructions.<n>The two reductions for the ring-trapdoor-based ring signatures exhibit various differences in requirements and the security they provide.
- Score: 3.466303200807006
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Ring signatures are a powerful primitive that allows a member to sign on behalf of a group, without revealing their identity. Recently, ring signatures have received additional attention as an ingredient for post-quantum deniable authenticated key exchange, e.g., for a post-quantum version of the Signal protocol, employed by virtually all end-to-end-encrypted messenger services. While several ring signature constructions from post-quantum assumptions offer suitable security and efficiency for use in deniable key exchange, they are currently proven secure in the random oracle model (ROM) only, which is insufficient for post-quantum security. In this work, we provide four security reductions in the quantum-accessible random oracle model (QROM) for two generic ring signature constructions: two for the AOS framework and two for a construction paradigm based on ring trapdoors, whose generic backbone we formalize. The two security proofs for AOS ring signatures differ in their requirements on the underlying sigma protocol and their tightness. The two reductions for the ring-trapdoor-based ring signatures exhibit various differences in requirements and the security they provide. We employ the measure-and-reprogram technique, QROM straightline extraction tools based on the compressed oracle, history-free reductions and QROM reprogramming tools. To make use of Rényi divergence properties in the QROM, we study the behavior of quantum algorithms that interact with an oracle whose distribution is based on one of two different distributions over the set of outputs. We provide tight bounds for the statistical distance, show that the Rényi divergence can not be used to replace the entire oracle and provide a workaround.
Related papers
- Verifier-initiated quantum message-authentication via quantum zero-knowledge proofs [38.81686642226027]
We introduce a new method where the verifier can request authentication only when needed, improving efficiency for quantum networks and blockchain applications.<n>Our approach adapts the concept of zero-knowledge widely used in classical cryptography to quantum settings, ensuring that verification reveals nothing about secret keys.<n>This work delivers the first general verifier-initiated quantum signature scheme with formal security, paving the way for scalable, secure authentication in future quantum infrastructures and decentralized systems.
arXiv Detail & Related papers (2025-12-05T04:40:34Z) - Quantum Skyshield: Quantum Key Distribution and Post-Quantum Authentication for Low-Altitude Wireless Networks in Adverse Skies [36.14072181405793]
Low-altitude wireless networks (LAWNs) have emerged as a critical backbone for supporting the low-altitude economy.<n>To meet growing data demands, some LAWN deployments incorporate free-space optical (FSO) links, which offer exceptional bandwidth and beam directivity.<n>Quantum Skyshield is proposed to enable reliable communication between the base transceiver station (BTS) and LAWN.
arXiv Detail & Related papers (2025-07-20T04:43:33Z) - Linearly Homomorphic Ring Signature Scheme over Lattices [17.028149148081148]
Homomorphic ring signature schemes combine the strong anonymity of ring signatures with the computability of homomorphic signatures.<n>No feasible homomorphic ring signature scheme currently exists.<n>We propose the first lattice-based linearly homomorphic ring signature scheme.
arXiv Detail & Related papers (2025-07-03T03:43:40Z) - Double-Signed Fragmented DNSSEC for Countering Quantum Threat [2.92803277424397]
We investigate the viability of employing 'Double-Signatures' in DNSSEC, combining a post-quantum digital signature and a classic one.<n>The inclusion of two signatures in the DNSSEC response message doesn't bode well with the maximum allowed size of DNSSEC responses.<n>We implement our solution on top of OQS-BIND and, through experiments, show that the addition of two signatures does not have a substantial impact on the efficiency of the resolution process.
arXiv Detail & Related papers (2024-11-12T04:22:57Z) - Cloning Games, Black Holes and Cryptography [50.022147589030304]
We introduce a new toolkit for analyzing cloning games.<n>This framework allows us to analyze a new cloning game based on binary phase states.<n>We show that the binary phase variantally optimal bound offers quantitative insights into information scrambling in idealized models of black holes.
arXiv Detail & Related papers (2024-11-07T14:09:32Z) - Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a novel quantum digital signature protocol without a trusted third-party.<n>We prove that the protocol has information-theoretical unforgeability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - Revocable Quantum Digital Signatures [57.25067425963082]
We define and construct digital signatures with revocable signing keys from the LWE assumption.
In this primitive, the signing key is a quantum state which enables a user to sign many messages.
Once the key is successfully revoked, we require that the initial recipient of the key loses the ability to sign.
arXiv Detail & Related papers (2023-12-21T04:10:07Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Efficient NIZKs and Signatures from Commit-and-Open Protocols in the
QROM [10.5811404306981]
Commit-and-open Sigma-protocols are a popular class of protocols for constructing non-interactive zero-knowledge arguments and digital-signature schemes.
We prove tight online extractability in the quantum random oracle model (QROM)
Our results yield a significant improvement of the provable post-quantum security of the digital-signature scheme Picnic.
arXiv Detail & Related papers (2022-02-28T12:51:51Z) - A Note on the Post-Quantum Security of (Ring) Signatures [17.284592769143075]
This work revisits the security of classical signatures and ring signatures in a quantum world.
We focus on the arguably preferable security notion of blind-unforgeability recently proposed by Alagic et al.
We present two short signature schemes achieving this notion.
arXiv Detail & Related papers (2021-12-11T21:51:41Z) - Isogeny-based Group Signatures and Accountable Ring Signatures in QROM [6.457790847177476]
We present the first provably secure isogeny-based group signature (GS) and accountable ring signature (ARS) in the quantum random oracle model (QROM)
We do so via introducing and constructing an intermediate primitive called the openable sigma protocol and demonstrating that any such protocol gives rise to a secure GS and ARS.
arXiv Detail & Related papers (2021-10-10T13:40:16Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.