Paper 2013/088

Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World

Dan Boneh and Mark Zhandry

Abstract

We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext security. In the case of signatures, we enhance the standard chosen message query model by allowing the adversary to issue quantum chosen message queries: given a superposition of messages, the adversary receives a superposition of signatures on those messages. Similarly, for encryption, we allow the adversary to issue quantum chosen ciphertext queries: given a superposition of ciphertexts, the adversary receives a superposition of their decryptions. These adversaries model a natural ubiquitous quantum computing environment where end-users sign messages and decrypt ciphertexts on a personal quantum computer. We construct classical systems that remain secure when exposed to such quantum queries. For signatures, we construct two compilers that convert classically secure signatures into signatures secure in the quantum setting and apply these compilers to existing post-quantum signatures. We also show that standard constructions such as Lamport one-time signatures and Merkle signatures remain secure under quantum chosen message attacks, thus giving signatures whose quantum security is based on generic assumptions. For encryption, we define security under quantum chosen ciphertext attacks and present both public-key and symmetric-key constructions.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Full version of Crypto 2013 paper
Keywords
Quantum computingsignaturesencryptionquantum security
Contact author(s)
mzhandry @ stanford edu
History
2013-06-13: last of 2 revisions
2013-02-20: received
See all versions
Short URL
https://ia.cr/2013/088
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/088,
      author = {Dan Boneh and Mark Zhandry},
      title = {Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World},
      howpublished = {Cryptology {ePrint} Archive, Paper 2013/088},
      year = {2013},
      url = {https://eprint.iacr.org/2013/088}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.