One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures

Carsten Baum, Ward Beullens, Shibam Mukherjee, Emmanuela Orsini, Sebastian Ramacher, Christian Rechberger, Lawrence Roy, Peter Scholl

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

The use of MPC-in-the-Head (MPCitH)-based zero-knowledge proofs of knowledge (ZKPoK) to prove knowledge of a preimage of a one-way function (OWF) is a popular approach towards constructing efficient post-quantum digital signatures. Starting with the Picnic signature scheme, many optimized MPCitH signatures using a variety of (candidate) OWFs have been proposed. Recently, Baum et al. (CRYPTO 2023) showed a fundamental improvement to MPCitH, called VOLE-in-the-Head (VOLEitH), which can generically reduce the signature size by at least a factor of two without decreasing computational performance or introducing new assumptions. Based on this, they designed the FAEST signature which uses AES as the underlying OWF. However, in comparison to MPCitH, the behavior of VOLEitH when using other OWFs is still unexplored. In this work, we improve a crucial building block of the VOLEitH and MPCitH approaches, the so-called all-but-one vector commitment, thus decreasing the signature size of VOLEitH and MPCitH signature schemes. Moreover, by introducing a small Proof of Work into the signing procedure, we can improve the parameters of VOLEitH (further decreasing signature size) without compromising the computational performance of the scheme. Based on these optimizations, we propose three VOLEitH signature schemes FAESTER, KuMQuat, and MandaRain based on AES, MQ, and Rain, respectively. We carefully explore the parameter space for these schemes and implement each, showcasing their performance with benchmarks. Our experiments show that these three signature schemes outperform MPCitH-based competitors that use comparable OWFs, in terms of both signature size and signing/verification time.
Original languageEnglish
Title of host publicationProceedings of International Conference on the Theory and Application of Cryptology and Information Security 2024, Asiacrypt
PublisherSpringer
Publication date2024
Pages463–493
ISBN (Print)978-981-96-0874-4
ISBN (Electronic)978-981-96-0875-1
DOIs
Publication statusPublished - 2024
Event30th International Conference on the Theory and Application of Cryptology and Information Security - Kolkata, India
Duration: 9 Feb 202413 Dec 2024

Conference

Conference30th International Conference on the Theory and Application of Cryptology and Information Security
Country/TerritoryIndia
CityKolkata
Period09/02/202413/12/2024

Fingerprint

Dive into the research topics of 'One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures'. Together they form a unique fingerprint.

Cite this