Post-Quantum Digital Signatures over Finite Fields with Hidden Generators

Authors

  • Tuan Nguyen Kim Phenikaa School of Computing, Phenikaa University, Ha Dong, Hanoi, Vietnam
  • Luu Hong Dung Le Quy Don Technical University, Northern Tu Liem, Hanoi, Vietnam
  • Hoang Duc Tho Vietnam Academy of Cryptography Techniques, Thanh Tri, Hanoi, Vietnam
  • Ha Nguyen Hoang University of Sciences, Hue University, Hue, Vietnam
Volume: 15 | Issue: 6 | Pages: 28660-28667 | December 2025 | https://doi.org/10.48084/etasr.13269

Abstract

The advent of quantum computers poses a direct threat to the security of traditional digital signature schemes, which are based on the Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) cryptosystems. Shor's algorithm allows solving the Discrete Logarithm Problem (DLP) in polynomial time, whereas Grover's algorithm significantly reduces the effort required for brute-force attacks on symmetric hash functions and ciphers. Although many post-quantum solutions have been proposed, such as lattice-based schemes (e.g., CRYSTALS-Dilithium, Falcon) or hash-based schemes (e.g., SPHINCS+), they still have some limitations to overcome, such as large public keys, bulky signatures, high computational costs, and difficulties in integrating into existing Public Key Infrastructures (PKIs). In this paper, we propose a new type of hard problem, defined over a finite prime field, in which the generator is kept secret to prevent any direct Shor attack and is only subject to a limited influence from Grover. Based on this newly proposed hard problem, we construct a post-quantum digital signature scheme that is both Shor-resistant and Grover-resistant, secure against classical attacks, and fully compatible with current PKI infrastructures. Compared with existing post-quantum digital signature schemes, our solution significantly optimizes the size of public keys and signatures while increasing the speed of signing and verification. The newly proposed hard problem cannot be solved by known classical or quantum algorithms, thus ensuring long-term security. Performance evaluation results show that the scheme provides an optimal balance between performance and security, opening up a cost-effective implementation path for the post-quantum cryptography era.

Keywords:

post-quantum digital signature, new hard problem, Shor's algorithm, Grover's algorithm, Public Key Infrastructure (PKI)

Downloads

Download data is not yet available.

References

P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," in Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994, pp. 124–134. DOI: https://doi.org/10.1109/SFCS.1994.365700

L. K. Grover, "A fast quantum mechanical algorithm for database search," in Proceedings of the twenty-eighth annual ACM symposium on Theory of Computing, Philadelphia, PA, USA, 1996, pp. 212–219. DOI: https://doi.org/10.1145/237814.237866

L. Ducas et al., "CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme," IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2018, no. 1, pp. 238–268, Feb. 2018. DOI: https://doi.org/10.46586/tches.v2018.i1.238-268

P. Fouque et al., "Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU," Post-Quantum Cryptography Standard, Jan. 2020.

D. J. Bernstein, A. Hülsing, S. Kölbl, R. Niederhagen, J. Rijneveld, and P. Schwabe, "The SPHINCS+ Signature Framework," in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 2019, pp. 2129–2146. DOI: https://doi.org/10.1145/3319535.3363229

J. Bos et al., "CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM," in 2018 IEEE European Symposium on Security and Privacy (EuroS&P), London, UK, 2018, pp. 353–367. DOI: https://doi.org/10.1109/EuroSP.2018.00032

A. Ali, M. a. H. Farquad, C. Atheeq, and C. Altaf, "A Quantum Encryption Algorithm based on the Rail Fence Mechanism to Provide Data Integrity," Engineering, Technology & Applied Science Research, vol. 14, no. 6, pp. 18818–18823, Dec. 2024. DOI: https://doi.org/10.48084/etasr.8993

D. Y. Guryanov, D. N. Moldovyan, and A. A. Moldovyan, "Post-quantum digital signature schemes: setting a hidden group with two-dimensional cyclicity," Informatization and communication, vol. 4, pp. 75–82, Nov. 2020. DOI: https://doi.org/10.34219/2078-8320-2020-11-4-75-82

A. A. Moldovyan, N. A. Moldovyan, D. N. Moldovyan, and A. A. Kostina, "A new approach to the development of digital signature algorithms based on the hidden discrete logarithm problem," Information Security Questions, no. 4 (135), pp. 45–49, 2021. DOI: https://doi.org/10.52190/2073-2600_2021_4_45

C. Battarbee, D. Kahrobaei, L. Perret, and S. F. Shahandashti, "SPDH-Sign: Towards Efficient, Post-quantum Group-Based Signatures," in Post-Quantum Cryptography: 14th International Workshop, PQCrypto 2023, College Park, MD, USA, 2023, pp. 113–138. DOI: https://doi.org/10.1007/978-3-031-40003-2_5

T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469–472, Jul. 1985. DOI: https://doi.org/10.1109/TIT.1985.1057074

I. Blake, G. Seroussi, and N. Smart, Elliptic Curves in Cryptography. Cambridge, UK: Cambridge University Press, 1999. DOI: https://doi.org/10.1017/CBO9781107360211

G. Filippone, "On the Discrete Logarithm Problem for elliptic curves over local fields." arXiv, Apr. 27, 2023.

A. Abdullah, A. Mahalanobis, and V. M. Mallick, "A new method for solving the elliptic curve discrete logarithm problem," Journal of Groups, Complexity, Cryptology, vol. 12, no. 2, Feb. 2021, Art. no. 2. DOI: https://doi.org/10.46298/jgcc.2020.12.2.6649

K. T. Nguyen, H. N. Hoang, and D. H. Ngoc, "A New Security Enhancing Solution when Building Digital Signature Schemes," Engineering, Technology & Applied Science Research, vol. 15, no. 3, pp. 23613–23621, Jun. 2025. DOI: https://doi.org/10.48084/etasr.10370

Downloads

How to Cite

[1]
T. N. Kim, L. H. Dung, H. D. Tho, and H. N. Hoang, “Post-Quantum Digital Signatures over Finite Fields with Hidden Generators”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 6, pp. 28660–28667, Dec. 2025.

Metrics

Abstract Views: 294
PDF Downloads: 201

Metrics Information