Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3634737.3657008acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies

Published: 01 July 2024 Publication History

Abstract

Cryptocurrency networks crucially rely on digital signature schemes, which are used as an authentication mechanism for transactions. Unfortunately, most major cryptocurrencies today, including Bit-coin and Ethereum, employ signature schemes that are susceptible to quantum adversaries, i.e., an adversary with access to a quantum computer can forge signatures and thereby spend coins of honest users. In cryptocurrency networks, signature schemes are typically not executed in isolation, but within a so-called cryptographic wallet. In order to achieve security against quantum adversaries, the signature scheme and the cryptographic wallet must withstand quantum attacks.
In this work, we advance the study on post-quantum secure signature and wallet schemes. That is, we provide the first formal model for deterministic threshold wallets and we show a generic post-quantum secure construction from any post-quantum secure threshold signature scheme with rerandomizable keys. We then instantiate our construction from the isogeny-based signature scheme CSI-FiSh and we show that our instantiation significantly improves over prior work.

References

[1]
[n. d.]. Bitcoin Post-Quantum. https://bitcoinpq.org/.
[2]
[n. d.]. Mochimo. https://mochimo.org/.
[3]
[n. d.]. Quantum Resistant Ledger (QRL). https://github.com/theQRL/Whitepaper/blob/master/QRL_whitepaper.pdf.
[4]
Shweta Agrawal, Damien Stehlé, and Anshu Yadav. 2022. Round-Optimal Lattice-Based Threshold Signatures, Revisited. In 49th International Colloquium on Automata, Languages, and Programming, ICALP 2022, July 4--8, 2022, Paris, France (LIPIcs, Vol. 229), Mikolaj Bojanczyk, Emanuela Merelli, and David P. Woodruff (Eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 8:1--8:20.
[5]
Nabil Alkeilani Alkadri, Poulami Das, Andreas Erwig, Sebastian Faust, Juliane Krämer, Siavash Riahi, and Patrick Struck. 2020. Deterministic Wallets in a Quantum World. In ACM CCS 2020, Jay Ligatti, Xinming Ou, Jonathan Katz, and Giovanni Vigna (Eds.). ACM Press, 1017--1031.
[6]
Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Krämer, Patrick Longa, and Jefferson E. Ricardini. 2020. The Lattice-Based Digital Signature Scheme qTESLA. In ACNS 20, Part I (LNCS, Vol. 12146), Mauro Conti, Jianying Zhou, Emiliano Casalicchio, and Angelo Spognardi (Eds.). Springer, Heidelberg, 441--460.
[7]
Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, and Aggelos Kiayias. 2019. A Formal Treatment of Hardware Wallets. In FC 2019 (LNCS, Vol. 11598), Ian Goldberg and Tyler Moore (Eds.). Springer, Heidelberg, 426--445.
[8]
Shahla Atapoor, Karim Baghery, Daniele Cozzo, and Robi Pedersen. 2023. CSI-SharK: CSI-FiSh with Sharing-friendly Keys. In Information Security and Privacy - 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5--7, 2023, Proceedings (Lecture Notes in Computer Science, Vol. 13915), Leonie Simpson and Mir Ali Rezazadeh Baee (Eds.). Springer, 471--502.
[9]
Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, and Gene Tsudik. 2005. Sanitizable Signatures. In ESORICS 2005 (LNCS, Vol. 3679), Sabrina De Capitani di Vimercati, Paul F. Syverson, and Dieter Gollmann (Eds.). Springer, Heidelberg, 159--177.
[10]
Daniel J. Bernstein, Tanja Lange, Chloe Martindale, and Lorenz Panny. 2019. Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies. In EUROCRYPT 2019, Part II (LNCS, Vol. 11477), Yuval Ishai and Vincent Rijmen (Eds.). Springer, Heidelberg, 409--441.
[11]
Ward Beullens, Lucas Disson, Robi Pedersen, and Frederik Vercauteren. 2021. CSI-RAShi: Distributed Key Generation for CSIDH. In PQCrypto 2021, Jung Hee Cheon and Jean-Pierre Tillich (Eds.). Springer, Heidelberg, 257--276.
[12]
Ward Beullens, Thorsten Kleinjung, and Frederik Vercauteren. 2019. CSI-FiSh: Efficient Isogeny Based Signatures Through Class Group Computations. In ASIACRYPT 2019, Part I (LNCS, Vol. 11921), Steven D. Galbraith and Shiho Moriai (Eds.). Springer, Heidelberg, 227--247.
[13]
Alexandra Boldyreva. 2003. Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. In PKC 2003 (LNCS, Vol. 2567), Yvo Desmedt (Ed.). Springer, Heidelberg, 31--46.
[14]
Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, and Mark Zhandry. 2011. Random Oracles in a Quantum World. In ASIACRYPT (LNCS, Vol. 7073), Dong Hoon Lee and Xiaoyun Wang (Eds.). Springer, Heidelberg, 41--69.
[15]
Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, and Tal Rabin. 1999. Adaptive Security for Threshold Cryptosystems. In CRYPTO'99 (LNCS, Vol. 1666), Michael J. Wiener (Ed.). Springer, Heidelberg, 98--115.
[16]
Daniel Cervantes-Vázquez, Mathilde Chenu, Jesús-Javier Chi-Domínguez, Luca De Feo, Francisco Rodríguez-Henríquez, and Benjamin Smith. 2019. Stronger and Faster Side-Channel Protections for CSIDH. In LATINCRYPT 2019 (LNCS, Vol. 11774), Peter Schwabe and Nicolas Thériault (Eds.). Springer, Heidelberg, 173--193.
[17]
Daniele Cozzo and Nigel P. Smart. 2019. Sharing the LUOV: Threshold Post-quantum Signatures. In 17th IMA International Conference on Cryptography and Coding (LNCS, Vol. 11929), Martin Albrecht (Ed.). Springer, Heidelberg, 128--153.
[18]
Daniele Cozzo and Nigel P. Smart. 2020. Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol. In PQCrypto 2020, Jintai Ding and Jean-Pierre Tillich (Eds.). Springer, Heidelberg, 169--186.
[19]
Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, and Siavash Riahi. 2021. The Exact Security of BIP32 Wallets. In ACM CCS 2021, Giovanni Vigna and Elaine Shi (Eds.). ACM Press, 1020--1042.
[20]
Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, and Siavash Riahi. 2023. BIP32-Compatible Threshold Wallets. Cryptology ePrint Archive (2023).
[21]
Poulami Das, Sebastian Faust, and Julian Loss. 2019. A Formal Treatment of Deterministic Wallets. In ACM CCS 2019, Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, and Jonathan Katz (Eds.). ACM Press, 651--668.
[22]
Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, and Benjamin Wesolowski. 2023. SCALLOP: Scaling the CSI-FiSh. In Public-Key Cryptography - PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7--10, 2023, Proceedings, Part I (Lecture Notes in Computer Science, Vol. 13940), Alexandra Boldyreva and Vladimir Kolesnikov (Eds.). Springer, 345--375.
[23]
Luca De Feo and Steven D. Galbraith. 2019. SeaSign: Compact Isogeny Signatures from Class Group Actions. In EUROCRYPT 2019, Part III (LNCS, Vol. 11478), Yuval Ishai and Vincent Rijmen (Eds.). Springer, Heidelberg, 759--789.
[24]
Luca De Feo and Michael Meyer. 2020. Threshold Schemes from Isogeny Assumptions. In PKC 2020, Part II (LNCS, Vol. 12111), Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, and Vassilis Zikas (Eds.). Springer, Heidelberg, 187--212.
[25]
Edward Eaton, Douglas Stebila, and Roy Stracovsky. 2021. Post-quantum Key-Blinding for Authentication in Anonymity Networks. In LATINCRYPT 2021 (LNCS, Vol. 12912), Patrick Longa and Carla Ràfols (Eds.). Springer, Heidelberg, 67--87.
[26]
Andreas Erwig and Siavash Riahi. 2022. Deterministic Wallets for Adaptor Signatures. In ESORICS 2022, Part II (LNCS, Vol. 13555), Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, and Weizhi Meng (Eds.). Springer, Heidelberg, 487--506.
[27]
Muhammed F. Esgin, Oguzhan Ersoy, and Zekeriya Erkin. 2020. Post-Quantum Adaptor Signatures and Payment Channel Networks. In ESORICS 2020, Part II (LNCS, Vol. 12309), Liqun Chen, Ninghui Li, Kaitai Liang, and Steve A. Schneider (Eds.). Springer, Heidelberg, 378--397.
[28]
Muhammed F. Esgin, Ron Steinfeld, and Raymond K. Zhao. 2022. MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments. In 2022 IEEE SP.
[29]
Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, and Dongxi Liu. 2019. MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol. In ACM CCS 2019, Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, and Jonathan Katz (Eds.). ACM Press, 567--584.
[30]
Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, and Hiroaki Kikuchi. 2018. Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks. In 2018 IEEE Conference on Dependable and Secure Computing (DSC). 1--8.
[31]
Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schröder, and Mark Simkin. 2016. Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys. In PKC 2016, Part I (LNCS, Vol. 9614), Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, and Bo-Yin Yang (Eds.). Springer, Heidelberg, 301--330.
[32]
Pierre-Alain Fouque, Jeffrey Hoffstein, Paul Kirchner, Vadim Lyubashevsky, Thomas Pornin, Thomas Prest, Thomas Ricosset, Gregor Seiler, William Whyte, Zhenfei Zhang, et al. 2018. Falcon: Fast-Fourier lattice-based compact signatures over NTRU. Submission to the NISTs PQC standardization process 36, 5 (2018).
[33]
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, and Tal Rabin. 1996. Robust Threshold DSS Signatures. In EUROCRYPT'96 (LNCS, Vol. 1070), Ueli M. Maurer (Ed.). Springer, Heidelberg, 354--371.
[34]
Gus Gutoski and Douglas Stebila. 2015. Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage. In FC 2015 (LNCS, Vol. 8975), Rainer Böhme and Tatsuaki Okamoto (Eds.). Springer, Heidelberg, 497--504.
[35]
Mingxing Hu. 2023. Post-Quantum Secure Deterministic Wallet: Stateless, Hot/Cold Setting, and More Secure. Cryptology ePrint Archive, Paper 2023/062.
[36]
Yashvanth Kondi, Bernardo Magri, Claudio Orlandi, and Omer Shlomovits. 2021. Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices. In 2021 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 608--625.
[37]
Benoît Libert, Marc Joye, and Moti Yung. 2014. Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares. In 33rd ACM PODC, Magnús M. Halldórsson and Shlomi Dolev (Eds.). ACM, 303--312.
[38]
Adriano Di Luzio, Danilo Francati, and Giuseppe Ateniese. 2020. Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains. In CANS 20 (LNCS, Vol. 12579), Stephan Krenn, Haya Shulman, and Serge Vaudenay (Eds.). Springer, Heidelberg, 323--343.
[39]
Antonio Marcedone, Rafael Pass, and abhi shelat. 2019. Minimizing Trust in Hardware Wallets with Two Factor Signatures. In FC 2019 (LNCS, Vol. 11598), Ian Goldberg and Tyler Moore (Eds.). Springer, Heidelberg, 407--425.
[40]
Gregory Maxwell. 2011. Deterministic Wallets. https://bitcointalk.org/index.php?topic=19137.msg239768.
[41]
Michael Meyer, Fabio Campos, and Steffen Reith. 2019. On Lions and Elligators: An Efficient Constant-Time Implementation of CSIDH. In PQCrypto 2019, Jintai Ding and Rainer Steinwandt (Eds.). Springer, Heidelberg, 307--325.
[42]
Michael Meyer and Steffen Reith. 2018. A Faster Way to the CSIDH. In IN-DOCRYPT 2018 (LNCS, Vol. 11356), Debrup Chakraborty and Tetsu Iwata (Eds.). Springer, Heidelberg, 137--152.
[43]
Philipp Muth and Fabio Campos. 2022. On Actively Secure Fine-Grained Access Structures from Isogeny Assumptions. In Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings (Lecture Notes in Computer Science, Vol. 13512), Jung Hee Cheon and Thomas Johansson (Eds.). Springer, 375--398.
[44]
Chris Peikert. 2020. He Gives C-Sieves on the CSIDH. In EUROCRYPT 2020, Part II (LNCS, Vol. 12106), Anne Canteaut and Yuval Ishai (Eds.). Springer, Heidelberg, 463--492.
[45]
Claus-Peter Schnorr. 1990. Efficient Identification and Signatures for Smart Cards. In CRYPTO'89 (LNCS, Vol. 435), Gilles Brassard (Ed.). Springer, Heidelberg, 239--252.
[46]
Adi Shamir. 1979. How to share a secret. Commun. ACM 22, 11 (1979).
[47]
Surbhi Shaw and Ratna Dutta. 2023. Compact Stateful Deterministic Wallet from Isogeny-Based Signature Featuring Uniquely Rerandomizable Public Keys. In CANS 2023 (Lecture Notes in Computer Science). Springer.
[48]
Peter W. Shor. 1994. Algorithms for Quantum Computation: Discrete Logarithms and Factoring. In 35th FOCS. IEEE Computer Society Press, 124--134.
[49]
Erkan Tairi, Pedro Moreno-Sanchez, and Matteo Maffei. 2021. Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments. In FC 2021.
[50]
Pieter Wuille. 2012. BIP32 Proposal. https://en.bitcoin.it/wiki/BIP_0032.
[51]
Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, and Haojin Zhu. 2022. Secure Hierarchical Deterministic Wallet Supporting Stealth Address. In ESORICS 2022 (LNCS, Vol. 13554), Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, and Weizhi Meng (Eds.). Springer, Heidelberg, 89--109.
[52]
Mark Zhandry. 2012. How to Construct Quantum Random Functions. In FOCS. IEEE Computer Society Press, 679--687.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security
July 2024
1987 pages
ISBN:9798400704826
DOI:10.1145/3634737
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 2024

Check for updates

Author Tags

  1. deterministic wallets
  2. threshold signatures with rerandomizable keys
  3. isogeny-based signatures
  4. post-quantum security

Qualifiers

  • Research-article

Funding Sources

  • (DFG, German Research Foundation)
  • German Federal Ministry of Education and Research (BMBF) project 6G-RIC
  • German Federal Ministry of Education and Research and the Hessen State Ministry for Higher Education, Research and the Arts within their joint support of the National Research Center for Applied Cybersecurity ATHENE
  • European Research Council (ERC) under the European Union?s Horizon 2020 and Horizon Europe research and innovation programs
  • Hector Foundation~II

Conference

ASIA CCS '24
Sponsor:

Acceptance Rates

Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 47
    Total Downloads
  • Downloads (Last 12 months)47
  • Downloads (Last 6 weeks)8
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media