Paper 2023/1915

Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies

Poulami Das, CISPA Helmholtz Center for Information Security, Germany
Andreas Erwig, Technical University of Darmstadt, Germany
Michael Meyer, University of Regensburg, Germany
Patrick Struck, University of Konstanz, Germany

Cryptocurrency networks crucially rely on digital signature schemes, which are used as an authentication mechanism for transactions. Unfortunately, most major cryptocurrencies today, including Bitcoin and Ethereum, employ signature schemes that are susceptible to quantum adversaries, i.e., an adversary with access to a quantum computer can forge signatures and thereby spend coins of honest users. In cryptocurrency networks, signature schemes are typically not executed in isolation, but within a so-called cryptographic wallet. In order to achieve security against quantum adversaries, the signature scheme and the cryptographic wallet must withstand quantum attacks. In this work, we advance the study on post-quantum secure signature and wallet schemes. That is, we provide the first formal model for deterministic threshold wallets and we show a generic post-quantum secure construction from any post-quantum secure threshold signature scheme with rerandomizable keys. We then instantiate our construction from the isogeny-based signature scheme CSI-FiSh and we show that our instantiation significantly improves over prior work.

Available format(s)
Cryptographic protocols
Publication info
Published elsewhere. Minor revision. To appear at ACM AsiaCCS 2024
deterministic walletssignatures with re-randomizable keysisogeny-based signaturespost-quantum security
Contact author(s)
poulami das @ cispa de
andreas erwig @ tu-darmstadt de
michael @ random-oracles org
patrick struck @ uni-konstanz de
2024-04-26: revised
2023-12-13: received
See all versions
Short URL
Creative Commons Attribution


      author = {Poulami Das and Andreas Erwig and Michael Meyer and Patrick Struck},
      title = {Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies},
      howpublished = {Cryptology ePrint Archive, Paper 2023/1915},
      year = {2023},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.