THE INITIAL CONCEPTS OF POST-QUANTUM SIGNATURE DESIGN USING VERKLE TREE

Authors: Maksim Iavich; Avtandil Gagnidze; Giorgi Iashvili
Affiliation: Scientific cyber security association, Caucasus University; Scientific cyber security association, East European University

Category:

Keywords: post-quantum, Verkle Tree, Merkle Tree, igital signature, post-quantum signature design, Key generation, Signature generation, Signature verification
ABSTRACT. The paper describes post-quantum hash-based digital schemes. It analyzes digital signatures based on Merkle tree. The authors of the papers offer the methodology of designing the digital signature using the novel technology, Verkle tree. They also offer the concepts of post-quantum signature design using Verkle Tree.

References:

1. Ladd, T., Jelezko, F., Laflamme, R. et al. Quantum computers. Nature 464, 45–53 (2010). https://doi.org/10.1038/nature08812
2. Divincenzo, D.P. (1997). Topics in Quantum Computers. In: Sohn, L.L., Kouwenhoven, L.P., Schön, G. (eds) Mesoscopic Electron Transport. NATO ASI Series, vol 345. Springer, Dordrecht. https://doi.org/10.1007/978-94-015-8839-3_18
3. Gardas, B., Dziarmaga, J., Zurek, W.H. et al. Defects in Quantum Computers. Sci Rep 8, 4539 (2018). https://doi.org/10.1038/s41598-018-22763-2
4. Lele, A. (2021). Quantum Computers. In: Quantum Technologies and Military Strategy. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030- 72721-5_3
5. J. Bardin, "Beyond-Classical Computing Using Superconducting Quantum Processors," 2022 IEEE International Solid- State Circuits Conference (ISSCC), 2022, pp. 422-424, doi: 10.1109/ISSCC42614.2022.9731635.
6. Dods, C., Smart, N.P., Stam, M. (2005). Hash Based Digital Signature Schemes. In: Smart, N.P. (eds) Cryptography and Coding. Cryptography and Coding 2005. Lecture Notes in Computer Science, vol 3796. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11586821_8
7. Buchmann, J., Dahmen, E., Szydlo, M. (2009). Hash-based Digital Signature Schemes. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds) Post-Quantum Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88702-7_3
8. Rohde, S., Eisenbarth, T., Dahmen, E., Buchmann, J., Paar, C. (2008). Fast Hash-Based Signatures on Constrained Devices. In: Grimaud, G., Standaert, FX. (eds) Smart Card Research and Advanced Applications. CARDIS 2008. Lecture Notes in Computer Science, vol 5189. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85893-5_8
9. M. Schneider and Shih-Fu Chang, "A robust content based digital signature for image authentication," Proceedings of 3rd IEEE International Conference on Image Processing, 1996, pp. 227-230 vol.3, doi: 10.1109/ICIP.1996.560425.
10. M. Iavich, G. Iashvili, R. Bocu and S. Gnatyuk, "Post-quantum digital signature scheme for personal data security in communication network systems", International Conference of Artificial Intelligence Medical Engineering Education, pp. 303-314, 2020.
11. Iavich, M., Gagnidze, A., Iashvili, G., Hash based digital signature scheme with integrated TRNG, CEUR Workshop Proceedings, 2018
12. Avtandil Gagnidze & Maksim Iavich & Giorgi Iashvili, 2017. "Some Aspects Of Post-Quantum Cryptosystems," Eurasian Journal of Business and Management, Eurasian Publications, vol. 5(1), pages 16- 20.
13. Chen, H.; Liang, D. Adaptive Spatio-Temporal Query Strategies in Blockchain. ISPRS Int. J. Geo-Inf. 2022, 11, 409. https://doi.org/10.3390/ijgi11070409
14. Weijie Wang, Yale University Annie Ulichney, Yale University Charalampos Papamanthou, Yale University, BalanceProofs: Maintainable Vector Commitments with Fast Aggregation, Cryptology ePrint Archive, 2022