Visible to the public Digital Signature Performance of a New Quantum Safe Multivariate Polynomial Public Key Algorithm

TitleDigital Signature Performance of a New Quantum Safe Multivariate Polynomial Public Key Algorithm
Publication TypeConference Paper
Year of Publication2022
AuthorsKuang, Randy, Perepechaenko, Maria
Conference Name2022 7th International Conference on Computer and Communication Systems (ICCCS)
KeywordsAuthentication Algorithms, Benchmark testing, Communication systems, digital signature schemes, DS, exponentiation, human factors, Industries, Java, Multivariate Polynomial Signature Schemes, Multivariate Polynomials, NIST, Portable computers, Post-quantum cryptography, PQC, PQC Performance, pubcrawl, Public key, public-key cryptography, resilience, Resiliency, Scalability
AbstractWe discuss the performance of a new quantumsafe multivariate digital signature scheme proposed recently, called the Multivariate Polynomial Public Key Digital Signature (MPPK DS) scheme. Leveraging MPPK KEM or key exchange mechanism, the MPPK DS scheme is established using modular exponentiation with a randomly chosen secret base from a prime field. The security of the MPPK DS algorithm largely benefits from a generalized safe prime associated with the said field and the Euler totient function. We can achieve NIST security levels I, III, and V over a 64-bit prime field, with relatively small public key sizes of 128 bytes, 192 bytes, and 256 bytes for security levels I, III, and V, respectively. The signature sizes are 80 bytes for level I, 120 bytes for level III, and 160 bytes for level V. The MPPK DS scheme offers probabilistic procedures for signing and verification. That is, for each given signing message, a signer can randomly pick a base integer to be used for modular exponentiation with a private key, and a verifier can verify the signature with the digital message, based on the verification relationship, using any randomly selected noise variables. The verification process can be repeated as many times as the verifier wishes for different noise values, however, for a true honest signature, the verification will always pass. This probabilistic feature largely restricts an adversary to perform spoofing attacks. In this paper, we conduct some performance analyses by implementing MPPK DS in Java. We compare its performance with benchmark performances of NIST PQC Round 3 finalists: Rainbow, Dilithium, and Falcon. Overall, the MPPK DS scheme demonstrates equivalent or better performance, and much smaller public key, as well as signature sizes, compared to the three NIST PQC Round 3 finalists.
DOI10.1109/ICCCS55155.2022.9846785
Citation Keykuang_digital_2022