Abstract

The MPC-in-the-head introduced in [IKOS07] has established itself as an important paradigm to design efficient digital signatures. For instance, it has been leveraged in the Picnic scheme [CDG+20] that reached the third round of the NIST Post-Quantum Cryptography Standardization process. In addition, it has been used in [Beu20] to introduce the Proof of Knowledge (PoK) with Helper paradigm. This construction permits to design shorter signatures but induces a non negligible performance overhead as it uses cut-and-choose. In this paper, we introduce the PoK leveraging structure paradigm along with its associated challenge space amplification technique. Our new approach to design PoK brings some improvements over the PoK with Helper one. Indeed, we show how one can substitute the Helper in these constructions by leveraging the underlying structure of the considered problem. This new approach does not suffer from the performance overhead inherent to the PoK with Helper paradigm hence offers different trade-offs between security, signature sizes and performances. In addition, we also present four new post-quantum signature schemes. The first one is based on a new PoK with Helper for the Syndrome Decoding problem. It relies on ideas from [BGKM22] and [FJR21] and improve the latter using a new technique that can be seen as performing some cut-and-choose with a meet in the middle approach. The three other signatures are based on our new PoK leveraging structure approach and as such illustrate its versatility. Indeed, we provide new PoK related to the Permuted Kernel Problem ( $$\textsf{PKP}$$ ), Syndrome Decoding ( $$\textsf{SD}$$ ) problem and Rank Syndrome Decoding $$(\textsf{RSD})$$ problem. Considering (public key + signature), we get sizes below 9 kB for our signature related to the $$\textsf{PKP}$$ problem, below 15 kB for our signature related to the $$\textsf{SD}$$ problem and below 7 kB for our signature related to the $$\textsf{RSD}$$ problem. These new constructions are particularly interesting presently as the NIST has recently announced its plan to reopen the signature track of its Post-Quantum Cryptography Standardization process.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.