A survey on lattice-based digital signature

Abstract Lattice-based digital signature has become one of the widely recognized post-quantum algorithms because of its simple algebraic operation, rich mathematical foundation and worst-case security, and also an important tool for constructing cryptography. This survey explores lattice-based digit...

Full description

Bibliographic Details
Main Authors: Fengxia Liu, Zhiyong Zheng, Zixian Gong, Kun Tian, Yi Zhang, Zhe Hu, Jia Li, Qun Xu
Format: Article
Language:English
Published: SpringerOpen 2024-04-01
Series:Cybersecurity
Subjects:
Online Access:https://doi.org/10.1186/s42400-023-00198-1
_version_ 1797219759182315520
author Fengxia Liu
Zhiyong Zheng
Zixian Gong
Kun Tian
Yi Zhang
Zhe Hu
Jia Li
Qun Xu
author_facet Fengxia Liu
Zhiyong Zheng
Zixian Gong
Kun Tian
Yi Zhang
Zhe Hu
Jia Li
Qun Xu
author_sort Fengxia Liu
collection DOAJ
description Abstract Lattice-based digital signature has become one of the widely recognized post-quantum algorithms because of its simple algebraic operation, rich mathematical foundation and worst-case security, and also an important tool for constructing cryptography. This survey explores lattice-based digital signatures, a promising post-quantum resistant alternative to traditional schemes relying on factoring or discrete logarithm problems, which face increasing risks from quantum computing. The study covers conventional paradigms like Hash-and-Sign and Fiat-Shamir, as well as specialized applications including group, ring, blind, and proxy signatures. It analyzes the versatility and security strengths of lattice-based schemes, providing practical insights. Each chapter summarizes advancements in schemes, identifying emerging trends. We also pinpoint future directions to deploy lattice-based digital signatures including quantum cryptography.
first_indexed 2024-04-24T12:38:45Z
format Article
id doaj.art-c4485b61c0fc40289a5dae6c286d946d
institution Directory Open Access Journal
issn 2523-3246
language English
last_indexed 2024-04-24T12:38:45Z
publishDate 2024-04-01
publisher SpringerOpen
record_format Article
series Cybersecurity
spelling doaj.art-c4485b61c0fc40289a5dae6c286d946d2024-04-07T11:22:17ZengSpringerOpenCybersecurity2523-32462024-04-017111810.1186/s42400-023-00198-1A survey on lattice-based digital signatureFengxia Liu0Zhiyong Zheng1Zixian Gong2Kun Tian3Yi Zhang4Zhe Hu5Jia Li6Qun Xu7Institute of Artificial Intelligence, Beihang UniversityEngineering Research Center of Ministry of Education for Financial Computing and Digital Engineering, Renmin University of ChinaEngineering Research Center of Ministry of Education for Financial Computing and Digital Engineering, Renmin University of ChinaEngineering Research Center of Ministry of Education for Financial Computing and Digital Engineering, Renmin University of ChinaEngineering Research Center of Ministry of Education for Financial Computing and Digital Engineering, Renmin University of ChinaEngineering Research Center of Ministry of Education for Financial Computing and Digital Engineering, Renmin University of ChinaEngineering Research Center of Ministry of Education for Financial Computing and Digital Engineering, Renmin University of ChinaEngineering Research Center of Ministry of Education for Financial Computing and Digital Engineering, Renmin University of ChinaAbstract Lattice-based digital signature has become one of the widely recognized post-quantum algorithms because of its simple algebraic operation, rich mathematical foundation and worst-case security, and also an important tool for constructing cryptography. This survey explores lattice-based digital signatures, a promising post-quantum resistant alternative to traditional schemes relying on factoring or discrete logarithm problems, which face increasing risks from quantum computing. The study covers conventional paradigms like Hash-and-Sign and Fiat-Shamir, as well as specialized applications including group, ring, blind, and proxy signatures. It analyzes the versatility and security strengths of lattice-based schemes, providing practical insights. Each chapter summarizes advancements in schemes, identifying emerging trends. We also pinpoint future directions to deploy lattice-based digital signatures including quantum cryptography.https://doi.org/10.1186/s42400-023-00198-1Post-quantum cryptographyLattice-based cryptographyLattice-based digital signatures
spellingShingle Fengxia Liu
Zhiyong Zheng
Zixian Gong
Kun Tian
Yi Zhang
Zhe Hu
Jia Li
Qun Xu
A survey on lattice-based digital signature
Cybersecurity
Post-quantum cryptography
Lattice-based cryptography
Lattice-based digital signatures
title A survey on lattice-based digital signature
title_full A survey on lattice-based digital signature
title_fullStr A survey on lattice-based digital signature
title_full_unstemmed A survey on lattice-based digital signature
title_short A survey on lattice-based digital signature
title_sort survey on lattice based digital signature
topic Post-quantum cryptography
Lattice-based cryptography
Lattice-based digital signatures
url https://doi.org/10.1186/s42400-023-00198-1
work_keys_str_mv AT fengxialiu asurveyonlatticebaseddigitalsignature
AT zhiyongzheng asurveyonlatticebaseddigitalsignature
AT zixiangong asurveyonlatticebaseddigitalsignature
AT kuntian asurveyonlatticebaseddigitalsignature
AT yizhang asurveyonlatticebaseddigitalsignature
AT zhehu asurveyonlatticebaseddigitalsignature
AT jiali asurveyonlatticebaseddigitalsignature
AT qunxu asurveyonlatticebaseddigitalsignature
AT fengxialiu surveyonlatticebaseddigitalsignature
AT zhiyongzheng surveyonlatticebaseddigitalsignature
AT zixiangong surveyonlatticebaseddigitalsignature
AT kuntian surveyonlatticebaseddigitalsignature
AT yizhang surveyonlatticebaseddigitalsignature
AT zhehu surveyonlatticebaseddigitalsignature
AT jiali surveyonlatticebaseddigitalsignature
AT qunxu surveyonlatticebaseddigitalsignature