September 18, 2022

Layering Quantum-Resistance into Classical Digital Signature Algorithms

Is it possible to make ECDSA signatures quantum-secure? Yes.

‍It is proven that asymmetric key cryptographic systems that rely on Integer Factorization or Discrete Logarithm as the underlying hard problem are vulnerable to quantum computers. Using Shor’s algorithm on a large-enough quantum computer, an attacker can cryptanalyze the public key to obtain the private key in O(logN) time complexity. For systems that use the classical Digital Signature Algorithm (DSA), Rivest-Shamir-Adleman (RSA) algorithm, or Elliptic-Curve Digital Signature Algorithm (ECDSA), it means that authentication, data integrity, and non-repudiation between the communicating parties cannot be assured in the post-quantum era.

In this paper, we present a novel approach using zero-knowledge proofs on the pre-image of the private signing key to layer in quantum resistance into digital signature deployments that require longer-term post-quantum protection while maintaining backward compatibility with existing implementations. We show that this approach can extend the cryptographic protection of data beyond the post-quantum era and is also easy to migrate to. An implementation of this approach applying a ZKBoo zero-knowledge proof on ECDSA signatures is realized using an RFC3161-compatible timestamp server with OpenSSL and an Adobe Acrobat Reader DC.

Be first to comment
Leave a reply