Previous Article in Journal
Towards Empowering Stakeholders Through Decentralized Trust and Secure Livestock Data Sharing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New Code-Based Identity-Based Signature Scheme from the Ternary Large-Weight SDP

1
ACSA Laboratory, Department of Mathematics, Faculty of Sciences, Mohammed First University, Oujda 60000, Morocco
2
Cryptography Research Center, Technology Innovation Institute, Abu Dhabi P.O. Box 9639, United Arab Emirates
*
Author to whom correspondence should be addressed.
Cryptography 2025, 9(3), 53; https://doi.org/10.3390/cryptography9030053
Submission received: 11 June 2025 / Revised: 26 July 2025 / Accepted: 27 July 2025 / Published: 4 August 2025

Abstract

Identity-based cryptography introduced by Shamir (Crypto’84) has seen many advances through the years. In the context of post-quantum identity-based schemes, most of the efficient designs are based on lattices. In this work, we propose an identity-based identification (IBI) scheme and an identity-based signature (IBS) scheme based on codes. Our design combines the hash-and-sign signature scheme, Wave, with a Stern-like signature scheme, BGKM-SIG1, instantiated over a ternary field using the large-weight Syndrome Decoding Problem (SDP). Our scheme significantly outperforms existing code-based identity-based signature constructions.

1. Introduction

Key management has been a challenging problem faced by cryptographers for many years. Public-key cryptography ( PKC ) emerged as a solution to this challenge and eliminated the need to share the keys securely as a prerequisite for secure communication over adversarial channels. However, this posed a new challenge since now the participants were required to authenticate the public keys; otherwise, malicious parties could easily impersonate benign users. Public-key infrastructure ( PKI ) attempted to solve this issue by providing certificates issued by trusted entities validating the authenticity of the keys.
Identity-based cryptography introduced by Shamir [1] envisioned a novel solution to this problem, where the parties could use recipients’ identities (such as unique email id , name, etc.) to encrypt the data, or the signer’s identity to verify the digital signatures. This eliminated the need to maintain public directories for the public keys or certificates; however, in identity-based cryptographic schemes, the entities cannot generate their private keys on their own. The keys must be generated by a trusted third party and sent to the user. The trusted entity also holds a system-wide secret called the master-secret key. The master-secret key is used to generate user-specific private keys from their identity after verifying the identity of the user (offline). An important work related to this paper is [1,2,3] which proposed a general framework for constructing identity-based identification ( IBI ) and identity-based signature ( IBS ) schemes from standard signature and identification schemes.
The recent extensive research on quantum computing has driven a significant acceleration in post-quantum cryptography ( PQC ) , which aims to replace the current cryptographic primitives that are based on integer factorization and discrete logarithm problems with quantum-safe alternatives, as those problems are already proven to be insecure once a large-scale quantum computer becomes feasible due to Shor’s algorithm [4].
Code-based cryptography is one of the oldest and most promising areas in PQC that is believed to be quantum-safe. The most heavily used problem in code-based cryptography is the decoding problem, which is stated as follows:
Problem 1
(Syndrome Decoding Problem SDP ). Given a matrix H $ F q ( n k ) × n , a syndrome s $ F q n k and w N , find a vector e F q n such that e H = s and | e | = w .
This can be seen as solving a linear system over the finite field F q but with a specific constraint on the Hamming weight ( | . | ) of the desired solution, and for a suitable choice of this weight w, SDP is believed to be hard to solve.
Despite the rapid improvements in the area of code-based signatures in the last few years [5,6,7], there are still only a few proposals in the literature regarding advanced signature primitives. Moreover, most existing ones are mainly initiated from the CFS scheme [8] and the Stern identification scheme [9]. The CFS is the first code-based hash-and-sign signature scheme; it can be seen as an adaptation of the Niederreiter cryptosystem [10] (using Goppa codes) into a hash-and-sign signature. However, the construction itself requires the code rate to be high, which consequently invalidates the claim of the indistinguishability of Goppa codes from random ones [11]. In addition, the sizes it provides are very large, making it unattractive for use in constructing other primitives. Specifically, the first code-based IBI / IBS scheme was proposed by Cayrel et al. [12]; their proposal essentially combines the CFS scheme with the Stern identification scheme ( m - CFS - Stern ). However, this approach results in impractical sizes and is insecure with the proposed parameters, as it employs Goppa codes with a high rate. Later, Alaoui et al. [13] proposed a new IBI / IBS employing the quasi-dyadic CFS signature [14], which was later shown to be vulnerable [15,16]. Two other subsequent works [17,18] mainly focused on proving the active and concurrent security of the IBI . The work of Yang et al. [17] proves that m - CFS - Stern - IBI [12] is secure under active attacks, and they used the OR -proof technique [19] to enhance the security from the passive to concurrent one. Similarly, Song and Zhao [18] made the same contribution using the PVR signature scheme [20] instead of CSF , yielding significantly larger sizes, as shown in Table 1. A more efficient IBS scheme was proposed by Barenghi et al. [5] constructed entirely from the LESS signature scheme [21], which is currently a candidate for NIST ’s additional call for post-quantum signature standardization. LESS is a signature scheme derived from transforming a zero-knowledge identification scheme into a signature using the Fiat–Shamir transform [22]; its security differs from the widely used SDP by relying on the Code-Equivalence Problem ( CEP ) which asks: given two linear codes represented by their corresponding generator matrices, decide whether they are equivalent or not.
From the CFS to the PVR , another code-based signature scheme enjoying short signatures and belonging to the category of hash-and-sign called Wave was proposed by Debris-Alazard et al. [23]. Wave [6,23] is based on the GPV framework [24] which utilizes a new family of trapdoor one-way preimage functions that are sampleable on average. In addition to the indistinguishability problem, it relies on the multi-target version of SDP [25] over the ternary field for a large weight, which was later proven to be harder than the binary one by Bricout et al. [26]. Furthermore, we add that Wave is the only scheme belonging to the hash-and-sign family that has remained secure, where the recent schemes Enhanced pqsigRM [27] and FuLeeca [28] have been proven to be insecure due to signature leakages [29,30]. Therefore, in this work, we aim to construct a post-quantum IBI / IBS scheme based mainly on Wave and the SDP in the large-weight setting. A choice that will improve previous code-based IBS schemes in terms of the size of the user secret key and the signature.

1.1. Contribution

We construct an identity-based identification scheme Wave - IBI , which combines the Wave signature scheme with a Stern-like identification scheme and proves its security against passive attacks. We also introduce an optimization technique for compressing the size of low or large-weight ternary vectors. This reduces the size of all recent Wave instances, and consequently, the size of the user secret key usk , achieving a compression gain of 5 % to 10 % . Using this compression alongside optimizations from Bidoux et al. [7], our Wave - IBS combining Wave [6] and the signature scheme derived from proof of knowledge proposed by Bidoux et al. BGKM - SIG 1 [7] outperforms the existing code-based IBS as shown in Table 1. In particular, we employed the BGKM - SIG 1 adapted to the full-weight SDP ( w = n ) over the ternary field rather than the binary one.

1.2. Organization

The organization of the paper is as follows. Section 2 covers the necessary preliminaries, including background on identity-based identification and signature schemes, as well as a description of the original Wave signature scheme, which forms the core of our constructions. Section 3 is dedicated to describing our main code-based identity-based identification scheme, for which we rigorously prove security against passive attacks. In Section 4, we describe our identity-based signature that we construct following the generic approach presented in [1,2,3] by taking Wave [6] as the first signature and BGKM - SIG 1 [7] based on full-weight SDP over the ternary field as the second one. Furthermore, we propose an improved compression that reduces the size of large-weight ternary vectors, and hence optimizes both of the size of the user’s secret key and signature as they contain ternary large-weight vectors. We also discuss the parameters chosen for our scheme and briefly describe how they should be selected to balance security and efficiency.

2. Preliminaries

2.1. Notation

For the rest of the paper, we will employ the following conventions:
  • General
qa prime number
F q a finite field of order q
S n group of permutations
x , y ( x , y N ) the set of integers { x , x + 1 , , y }
# I or | I | ( I a set)the cardinal of the set
I ¯ ( I a subset of a , b )is the complementary of I .
  • A function is called negligible if for all sufficiently large λ N , negl ( λ ) < λ c , for all constant c > 0 .
  • Vectors and Matrices
x F q n a row vector with n coordinates in F q
x a column vector which is the transpose of x
| x | ( x F q n )the Hamming weight: number of non-zero entries in x
S w subset of vectors in F q n of Hamming weight w
x y component-wise product
x I vector x with only the coordinates indexed by I , ( x i ) i I
X F q m × n ( m , n ) -matrix with entries in F q
GL n ( F q ) group of invertible square matrices of size n with entries in F q
  • Probability for a finite set I , the notation i $ I indicates that i is assigned to be an element chosen uniformly at random from I while i $ , θ I indicates that i is assigned to be an element chosen uniformly at random using the seed θ . We denote the uniform distribution on S w by U w . The statistical distance between two discrete probability distributions over the same space E is defined as ρ ( D 0 , D 1 ) 1 2 x E | D 0 ( x ) D 1 ( x ) | .

2.2. Sigma Protocol and Identity-Based Identification

For a binary relation R { 0 , 1 } × { 0 , 1 } , ( y , x ) R indicates that y is a statement and x is a witness for y. The set of statements y that admit a witness x is denoted by L R , i.e., L R = { y x such that ( y , x ) R } , while the set of witnesses for a statement y is denoted by R ( y ) , i.e., R ( y ) = { x ( y , x ) R } . R is said to be an NP relation if the validity of a witness x can be verified in time poly ( | y | ) .
Definition 1
(Interactive proof [31]). An interactive proof ( P , V ) for a relation R is an interactive protocol between two probabilistic polynomial-time machines; a prover P and a polynomial-time verifier V . It allows a prover to convince a verifier that it knows a witness x for a public statement y, where both P and V take as public input the statement y and, additionally, P takes as private input the witness x R ( y ) , which is denoted P ( x ) , V ( y ) . The verifier V outputs accept depending on whether the prover’s claim of knowing a witness x R ( y ) . Accordingly, we say the corresponding transcript is valid or invalid.
Definition 2
(Knowledge Soundness [31]). An interactive protocol proof ( P , V ) for a relation R is knowledge sound with error ε K S : { 0 , 1 } [ 0 , 1 ] if there exists PPT algorithm Ext called extractor such that for every prover P and every y, if P convinces the verifier V with probability ε ( y , P ) > ε KS ( y ) , i.e., Pr [ ( P , V ) ( y ) = 1 ] > ε KS ( y ) , then Ext P ( y ) outputs a witness x R ( y ) with probability
Pr [ ( y ; Ext P ( y ) ) R ] ε y , P ε KS ( y ) poly ( | y | ) .
Definition 3
(k-special Soundness [31]). Let k and N N such that k N . A 3-round interactive protocol proof ( P , V ) for a relation R and a challenge set of cardinality N where the V ’s random choices are public is said to be k-special sound if there exists a polynomial-time algorithm that, on input of a statement y and k accepting transcripts com , ch 1 , res 1 , , com , ch k , res k with common first message com and pairwise distinct challenges ch 1 , , ch k , outputs a witness x R ( y ) .
Corollary 1.
Let k and N N such that k N . Let ( P , V ) be a k-special-sound 3-round interactive protocol for a relation R, where V samples each challenge uniformly at random from the challenge set of cardinality N. Then, ( P , V ) is knowledge sound with knowledge error
ε K S = k 1 N .
Remark 1.
Corollary 1 is a consequence of [31] (Theorem 4) for the special case μ = 1 , i.e., when ( P , V ) is a 3-round interactive protocol.
Definition 4.
An interactive proof ( P , V ) is called honest-verifier zero-knowledge (HVZK) if there exists a polynomial-time simulator that on input y L R outputs an accepting transcript that has close distribution to the transcripts generated by honest executions. If the simulator proceeds by first sampling the verifier’s messages uniformly at random, then ( P , V ) is called special honest-verifier zero-knowledge (SHVZK).
Definition 5
( IBI [3]). An identity-based identification scheme consists of a quadruplet of polynomial-time algorithms IBI = MKGen , UKGen , P , V , called master-key generation, user-key generation, proving algorithm (run by the prover), and verifying algorithm (run by a verifier), respectively.
  • MKGen : On input 1 λ , where λ is a security parameter, returns a master-public and secret key pair ( mpk , msk ) .
  • UKGen : On input msk and identity id { 0 , 1 } , it outputs a user secret key usk , which is assumed to be securely communicated to the user with the identity id . In some cases, we allow the UKGen algorithm to output additional auxiliary information aux which can be shared publicly/with a verifier during the interactive protocol without compromising the secret information.
  • P , V  Identification protocol: interactive protocol between a prover P with inputs mpk , id , usk and a verifier V with inputs id , mpk . The protocol ends when V outputs accept or reject .
Definition 6
( IBI Security [3,32,33]). An identity-based identification IBI = MKGen , UKGen , P , V is secure against impersonation under passive(pa), active(aa), concurrent(ca) attack if
Adv A , IBI imp atk ( λ ) : = Pr [ Expt A , IBI imp atk λ = 1 ] is negligible ,
where λ is the security parameter, a t k { p a , a a , c a } and Expt A , IBI imp atk λ is described in the following:
  • Experiment  Expt A , IBI imp atk λ :
  • Setup : The challenger obtains ( mpk , msk ) MKGen 1 λ , and initializes the sets/lists H U , C U , A U , P S into , where: H U is the honest users set, C U is the corrupted users set, A U is the attacked user set, and P S is the prover’s session set.
  • Phase 1: the adversary A is allowed to query three different oracles, Initialize , Corrupt and Conversation oracle if a t k = p a , otherwise, the Conversation is replaced by Prove oracle.
    Initialize ( id ) : if id H U C U A U , then it returns . Otherwise, it updates the set H U H U { id } and runs UKGen ( msk , id ) to obtain a user secret key usk ( id ) that will be kept secret and returns 1 at the end.
    Corrupt ( id ) : if id H U ¯ C U A U , then it returns . Otherwise, it updates the sets C U C U { id } , H U H U { id } , and returns usk ( id ) .
    Conversation ( id ) : if id H U A U , then it returns . Otherwise, it returns a conversation transcript C Run P id , usk ( id ) , mpk , V id , mpk .
    Prove ( id , s , m input ) : if id H U A U , then it returns . Otherwise, if a t k = a a : if P S , it updates P S = { ( id , s ) } , then, picks a random coin ρ, sets a state for the prover St P [ ( id , s ) ] ( mpk , usk ( id ) , ρ ) and becomes m output , St P [ ( id , s ) ] P m input , St P [ ( id , s ) ] . At the end it returns m output . Furthermore, if m output is the final message of the protocol, it resets P S back to . Else if a t k = c a , it updates P S = P S { ( id , s ) } and follows exactly the procedure as in a t k = a a except that it does not reset P S back to even if m output is the final message of the protocol.
  • Phase 2: the adversary A reveals the target identity id t that it will impersonate. If id t H U , the challenger halts; otherwise, it updates the set A U A U { id t } . The adversary A is still allowed to query the three defined oracles in the first phase (except for id t ).
Definition 7.
A digital signature scheme consists of a triple of polynomial-time algorithms, Sig = KGen , Sign , Verify , called the key-generation algorithm, signing algorithm, and verification algorithm, respectively.
  • KGen : on input 1 λ , where λ is a security parameter, it generates a public key and secret key pair ( pk , sk ) .
  • Sign : on input secret key sk and a message m, returns a signature σ.
  • Verify : on input public key pk , a message m, and the signature σ returns deterministically accept if the message was signed using the legitimate secret key, or reject otherwise.
  • A signature scheme is required to satisfy the following property:
Correctness. for all λ N and all messages m it holds that
Pr Verify ( pk , m , σ ) = 1 ( pk , sk ) KGen ( 1 λ ) , σ Sign ( sk , m ) = 1 .
Definition 8
(EUF-CMA). A signature scheme Sig = KGen , Sign , Verify is secure against existential unforgeability under chosen-message attack (EUF-CMA), if for all (quantum) polynomial-time algorithm A
Pr Verify ( pk , m , σ ) = 1 and m Sign q list | ( pk , sk ) KGen 1 λ , ( m , σ ) A O Sign ( pk ) = 1
where Sign q list is the list of all the queries made to the oracle O Sign .

2.3. Identity-Based Signatures

Definition 9
( IBS [3]). An identity-based signature scheme consists of quadrupled polynomial-time algorithms IBS = ( MKGen , UKGen , Sign , Verify ) , called master-key generation, user-key generation, signing algorithm, and verification algorithm, respectively.
  • MKGen : on input 1 λ , where λ is a security parameter, returns a master-public and secret key pair ( mpk , msk ) .
  • UKGen : on input msk and identity id { 0 , 1 } , it outputs a user secret key usk , which is assumed to be transmitted securely to the user with the identity id .
  • Sign : a randomized algorithm that takes on its input a master-public key, a user secret key, and a message, and it returns a signature σ of the message.
  • Verify : a deterministic algorithm that on input an identity, a message, a signature σ, and the mpk returns a decision: accept if σ is a valid signature for m and id , or reject otherwise.
  • A third party (or a trusted authority) runs the first two algorithms. An identity-based signature scheme is required to satisfy the following property:
Correctness. for all λ N , all messages m and for all identities id it must hold that
Pr Verify ( mpk , id , m , σ ) = 1 | ( mpk , msk ) MKGen ( 1 λ ) , usk ( id ) UKGen ( msk , id ) , σ Sign ( usk ( id ) , id , m ) = 1 .
Definition 10
(IBS-EUF-CMA). An identity-based signature scheme IBS = ( MKGen , UKGen , Sign , Verify ) is secure against existential unforgeability under chosen-message attack ( IBS -EUF-CMA), if for all (quantum) polynomial-time algorithm A , the following probability is negligible
Pr Verify ( mpk , id , m , σ ) = 1 , id C U , m Sign q list ( id ) | ( mpk , msk ) MKGen 1 λ , ( m , σ ) A Initialize , Corrupt , O Sign ( mpk , id )
where C U is the list of all corrupted users, Sign q list ( id ) is the list of all the queries made to O Sign ( usk ( id ) , · ) . The oracles Initialize ( id ) and Corrupt ( id ) remain consistent with those described in Definition 6.

2.4. Code-Based Cryptography

Throughout the paper, we let n , k , and q be positive integers such that k n .
Definition 11
(Linear code).  ( n , k ) -linear code C over F q is a k-dimensional subspace of F q n . The code C can be represented by its generator matrix G F q k × n , such that C = x G x F q k or by its parity-check matrix H F q ( n k ) × n such that C = x F q n x H = 0 .
Problem 2
(Syndrome Decoding Problem SDP ( n , k , w ) ). Given H $ F q ( n k ) × n , a syndrome s $ F q n k and w N , find a vector e F q n such that e H = s and | e | = w .
Remark 2.
The choice of the weight w is crucial for initiating cryptographic schemes using SDP as the average complexity of the best algorithms solving the problem are polynomial in n when w q 1 q ( n k ) , k + q 1 q ( n k ) and becomes exponential outside that range.

2.5. Wave Signature Scheme

Wave is a hash-and-sign code-based signature scheme initially proposed by Debris-Alazard et al. [23] in 2019 and was submitted to NIST’s post-quantum cryptography ( PQC ) standardization process [6,34] focusing on additional digital signature schemes. Wave is constructed using a new family of trapdoor one-way preimage functions that are sampleable on average, which is a relaxed requirement from the definition given in the GPV framework [24], which upon the lattice-based signature scheme Falcon [35] was built. Unlike Falcon that relies on the Short Integer Solution problem ( SIS ) over the NTRU lattices, Wave ’s security is based on problems from coding theory over the ternary field F 3 , specifically (i) the multi-target version of SDP for a large weight that is known as the Decoding One Out of Many DOOM [25] and (ii) Distinguishing Wave Keys ( DWK ) (distinguishing a random code from the generalized ( U , U + V ) -code used as the base code for the scheme). Before detailing the description of the scheme, we recall some necessary notions used in constructing the Wave trapdoor.
From now on q = 3 . Let n , k u , k v N , where n is even and 0 k v k u n / 2 . Additionally, let a , b , c and d be vectors in F q n / 2 , such that i 1 , n / 2
a i c i 0 a i d i b i c i = 1 .
Definition 12
( U V -Normalized Mapping [23]). Let a , b , c and d vectors in F 3 n / 2 verifying (1). The map
φ : F q n / 2 × F q n / 2 F q n / 2 × F q n / 2 ( x , y ) ( a x + b y , c x + d y )
is a bijection called U V -normalized mapping.
Definition 13
(Normalized Generalized ( U , U + V ) -Code [23]). Let U and V be two linear codes of length n / 2 and dimension k u and k v , respectively, over F q . A Normalized Generalized ( U , U + V ) -Code is defined as:
C : = φ ( x u , x v ) : x u U and x v V : = a x u + b x v , c x u + d x v : x u U and x v V ,
it has dimension k : = k u + k v and admits the following matrix H C as its parity-check matrix,
H C = H U D H U B H V C H V A
where ( H U , H V ) F q n 2 k u × n 2 × F q n 2 k v × n 2 are the parity-check matrices of linear codes U and V. Furthermore, the vectors a , b , c , d F q n / 2 satisfy (1), and for x a , b , c , d , X : = Diag ( x ) F q n / 2 × n / 2 .
Proposition 1
([23] (Proposition 3)). Let C be a normalized generalized ternary ( U , U + V ) -code and H C its associated parity-check matrix.
Solving e H C = s F q n k is equivalent to solving e u H U = s u F q n / 2 k u e v H V = s v F q n / 2 k v
where e = φ ( e u , e v ) F q n / 2 × F q n / 2 and s = ( s u , s v ) F q ( n / 2 k u ) × F q ( n / 2 k v ) .
In Figure 1, we recall the original Wave signature scheme [23]. Let λ be a security parameter from which we derive the system parameters n , w , k = k u + k v . Let h : { 0 , 1 } F q n k be a cryptographic hash function that will be modeled as a random oracle in the security proof. Additionally, we consider φ a U V -normalized mapping, H U F q n / 2 k u × n / 2 , H V F q n / 2 k v × n / 2 , S GL n k ( F q ) and a permutation matrix P F q n × n . Each of these elements is chosen uniformly at random from its respective domain. Moreover, we denote H sk : = H C as defined in Definition 13, where C is the normalized generalized ternary ( U , U + V ) -code.
The decoding algorithm decode u , v consists of two sub-decoding algorithms. The first one, decode v , is related to the V-code and produces an error e v that solves the second equation in Proposition 1 e v H V t = s v F q n / 2 k v using Prange’s algorithm [36]. The second decoding algorithm decode u is related to the U-code and benefits from e v to output an error e u that (i) solves the second equation in Proposition 1 e u H U = s u F q n / 2 k u using Prange’s algorithm and that (ii) ensures that | e | = | φ ( e u , e v ) | = w . As with other GPV-like schemes [24], the distribution of e = φ ( e u , e v ) output by the decoding algorithm decode u , v must be independent of the trapdoor, i.e., the statistical distance between e and e unif $ S w should be negligible. This is achieved in the original Wave using rejection sampling, which ensures that the signature produced does not reveal anything about the secret. Furthermore, the weight w of the output of the decoding algorithm decode u , v is large, and on average, it is expected to be,
w = | e | = 2 k u + q 1 q n 2 k u ,
for which the decoding without s k = ( P , S , H U , H V , φ ) is hard. In order to demonstrate why it is hard, we shall start by briefly explaining Prange’s algorithm, which is the main core of decode u , v . For the sake of simplicity, let’s consider ( H , s , w ) an instance of the SDP . The first step of the Prange algorithm consists of choosing a set I $ { 1 n } of size k and checks whether it is an information set, i.e., H I ¯ is invertible. If it is not, it chooses another one. By considering the matrix H ¯ : = H I ¯ 1 H I and the vector s ¯ : = H I ¯ 1 s , we get
s ¯ = H I ¯ 1 H e = H I ¯ 1 ( H I e I t + H I ¯ e I ¯ ) = H ¯ e I t + e I ¯
e I ¯ = s ¯ e I H ¯ .
  • Sampling e I $ S w 1 k for w 1 0 , k will result a solution to the equation e H ¯ = s ¯ that has an expected weight E ( | e | ) = E ( | e I | + | e I ¯ | ) = E ( | e I | + | s ¯ e I H ¯ | ) = w 1 + q 1 q ( n k ) q 1 q ( n k ) , k + q 1 q ( n k ) . Going back to decode u , v , as we mentioned before, the first decoding algorithm decode v outputs any solution to the first equation in Proposition 1 using Prange. Since the e u appears twice in e = φ ( e u , e v ) = a e u + b e v , c e u + d e v , it is used to maximize the weight of target vector e , and that by taking ( e u ) I u F q k u such that ( e u ) I u { a I u 1 b I u ( e v ) I u , c I u 1 d I u ( e v ) I u } , which implies that | e I u | = | e ( I u + n 2 ) | = k u . Hence,
    E ( | e | ) = E ( | a e u + b e v , c e u + d e v | ) = 2 E ( | e I u | ) + E ( | e I ¯ u | ) = 2 k u + q 1 q ( n 2 k u ) = 2 k u + q 1 q ( n 2 k u )
    and since k = k u + k v , we have 2 k u + q 1 q ( n 2 k u ) k + q 1 q ( n k ) which explains why the weight of the solution the SDP output by decode u , v in Wave is hard to find without the trapdoor. We stress again that the original Wave uses a rejection sampling in its decoding algorithm in order to achieve solutions that are close to the ones that are uniformly distributed in S w . Furthermore, Wave has been proved to be EUF-CMA secure based on the two following assumptions: the first relies on the hardness of decoding random codes, and the second relies on distinguishing a random code from a normalized generalized ( U , U + V ) -code.
Problem 3
(Decoding One Out of Many DOOM ( n , k , w , N ) [25]). Given a matrix H F q ( n k ) × n , ( s i ) i 1 , N F q n k , and w N , find e F q n and i 1 , N such that e H = s i and | e | = w .
Problem 4
(Distinguishing Wave Keys Problem DWK n , k u , k v [6] (Problem 3)). Given H F q n k u + k v × n , decide whether H has been chosen uniformly at random or among parity-check matrices of permuted generalized ( U , U + V ) -codes where U resp. V has dimension k u resp. k v and length n 2 .

3. Identity-Based Identification from Wave

In this section, we present the Wave - IBI scheme and prove its security against passive attacks. Let Wave . Sig = ( KGen , Sign , Verify ) be the triple algorithms defining the Wave signature scheme, as described in Figure 1. Let h be a hash function that will be modeled as a random oracle; h : { 0 , 1 } F q n k . Additionally, let Com ( ) be a standard commitment scheme, which, in practice, is assumed to be implemented using a hash function.
The proposed Wave - IBI scheme is detailed in the following Figure 2.
There are two strategies for impersonating a user with identity id if x and σ were honestly generated using the seeds:
  • Strategy 1: replacing e id with an e F q n such that e H = y = h ( id , i ) , by that, a cheating prover hopes that b = 0 .
  • Strategy 2: replacing e id by an arbitrary e F q n of weight w, by that a cheating prover hopes that b = 1 .
Theorem 1.
The identification part of the Wave - IBI  Figure 2 is an honest-verifier zero-knowledge proof of knowledge with a challenge space { 0 , 1 } 2 , 3-special soundness, and has soundness error of 1 / 2 .
Proof. 
In the following, we prove the three required properties.
  • Completeness. evident from the construction that an honest prover possessing a valid solution to e H = h ( i d , i ) of weight w always passes the verification with probability one.
  • 3-Special soundness. let T 0 = ( H , id , i , com , ( b 0 , c 0 ) , res 0 ( 0 ) , res 0 ( 1 ) ) , T 1 = ( H , id , i , com , ( b 1 , c 1 ) , res 1 ( 0 ) , res 1 ( 1 ) ) and T 2 = ( H , id , i , com , ( b 2 , c 2 ) , res 2 ( 0 ) , res 2 ( 1 ) ) be three valid transcripts sharing the same commitment com = ( com ( 0 ) , com ( 1 ) ) and distinct challenges, thus, there exists at least (i)- two valid transcripts with different c i , and (ii)- two other valid transcripts with different b i with the same c i . From (i)- we can deduce that all the setups were generated honestly, and from (ii)- we can clearly extract the witness by computing res ( c i ) [ 3 ] 1 res ( c i ) [ 4 ] .
  • Special honest-verifier zero-knowledge. we build a simulator Sim that can produce an indistinguishable transcript T ( b , c ) = ( H , id , i , com , ( b , c ) , res ) from the one obtained by honest execution of the protocol T ( b , c ) , without knowing a witness, when given ( H , id , i ) , the challenge ( b , c ) { 0 , 1 } 2 and the seed ( θ ( i ) ) i { 0 , 1 } as input.
    • From the seed ( θ ( i ) ) i { 0 , 1 } , the simulator computes honestly σ ( i ) , x ( i ) , r 1 ( i ) , r 2 ( i ) i { 0 , 1 } .
    • For b = 0 , the simulator follows Strategy 1; taking any solution e F q n to y = e H and then computing com and res normally following the protocol. Since x ( c ) and σ ( c ) are sampled uniformly at random, the res generated by the simulator has the same distribution as res . We have
      Pr [ V ( H , id , i , com , ch , res ) = 1 ( com , ch , res ) Sim ( H , id , i , ch , seed ) ] = 1
      where ch = ( b , c ) and seed = θ ( i ) i { 0 , 1 } .
    • For b = 1 , the simulator follows Strategy 2; taking any vector e $ S w and then computing com and res normally following the protocol. Since σ is sampled uniformly at random from S n and ρ ( D w , U w ) is negligible as Wave ’s trapdoor one-way function is preimage sampleable on average, then it satisfies the property of the preimage sampling on average. Therefore, res generated by the simulator has the same distribution as res .
      Pr [ V ( H , id , i , com , ch , res ) = 1 ( com , ch , res ) Sim ( H , id , i , ch , seed ] = 1
      where ch = ( b , c ) and seed = ( θ ( i ) ) i { 0 , 1 } .
    If the commitment scheme Com () is hiding, then com and com are indistinguishable, and consequently, the two transcripts are indistinguishable as well.
Theorem 2.
The Wave - IBI depicted in Figure 2 is secure under passive attacks.
Proof. 
Let q h , q e , and q c denote the maximum number of queries that the adversary A can make to the Hash , Corrupt , and Conversation oracles, respectively, in the imp-pa security model against Wave - IBI . Also, let q : = q h + q e + q c and H 0 , s 1 , , s q be an instance of DOOM ( n , k , w , q ) as defined in Problem 3. Additionally, we note that all queries to the Hash are consistent, meaning that the Hash will always return the same output for the same input.
  • Game 0: This is the standard imp-pa game. The Hash and UKGen oracles in this game are defined as the following, Cryptography 09 00053 i001
Let S 0 be the event that A wins the game 0, therefore,
Pr [ S 0 ] = Adv A , IBI imp pa ( λ ) .
  • Game 1: This game has some differences in the Setup , Hash , and UKGen oracles from the previous game. These differences are specified in the following, Cryptography 09 00053 i002
The oracles UKGen and Hash , share a global string i id for every identity id queried by the adversary. The string i id is sampled uniformly at random from { 0 , 1 } λ 0 when either of the oracles is queried with an identity id for the first time. After this, for every hash query Hash ( id , i ) the Hash oracle first checks if i = i id and if it holds then samples a fresh e id , i $ S w and returns e id , i H . Otherwise, it returns a fresh syndrome s j from the DOOM instance. The UKGen oracle also maintains a list of returned user secret keys e id , i for each id queried by the adversary.
The main difference between Game 1 and Game 0 lies in the call of the Hash . In Game 0, it was outputting a random value uniformly distributed over F q n k , whereas in this game, it outputs e H where e $ S w . The difference between the output of the two Hashes corresponds to the statistical distance between U : the uniform distribution over F q n k and D w H : the syndromes generated using H , and e $ S w , which is proven to be negl ( λ ) following [23] (Proposition 9).
Let S 1 be the event the adversary A wins Game 1,
Pr [ S 0 ] Pr [ S 1 ] + negl ( λ ) .
  • Game 2: This game differs from Game 1 by making the following change to the UKGen . Instead of computing e from the decoding algorithm decode u , v , in Game 2 UKGen samples e id , i $ S w uniformly at random and outputs ( e id , i , i ) . Therefore, the difference between Game 1 and Game 2 corresponds to the statistical distance between D w , representing the distribution of the output of decoding decode u , v and U w , representing the uniform distribution over S w . Hence, we have
    Pr [ S 1 ] Pr [ S 2 ] + negl ( λ ) .
  • Game 3: In this game, the matrix H is replaced by H 0 , in this way, the adversary is forced to find a solution to the DOOM problem. The adversary A can detect the difference between this game and the previous one only if he can distinguish between D pub : the distribution of the public key H , and D rand : the uniform distribution over F q ( n k u k v ) × n . Let S 3 be the event that A wins this game, then assuming the hardness of Problem 4,
    Pr [ S 2 ] Pr [ S 3 ] + negl ( λ ) .
  • Game 4: In this game, once the adversary reveals the target identity id t that he intends to impersonate, the challenger checks whether ( id t , i id t ) has already been queried to the Hash oracle before. If such a query has been made previously, the challenger aborts the game. Recall that i id $ { 0 , 1 } λ 0 is sampled uniformly at random. Therefore, by setting λ 0 = λ + 2 log 2 ( q ) 2 log 2 ( q ) = log 2 ( q 2 ) and q 2 , we can ensure that the challenger does not abort with probability bounded by 1 2 since
    1 2 λ 0 q 1 1 q 2 q 1 2
    hence,
    Pr [ S 4 ] = 1 1 2 λ 0 q Pr [ S 3 ] 1 2 Pr [ S 3 ] .
  • Game 5: Please note that at this point, none of the responses to the Hash and UKGen queries depend on the secret since they have been replaced by random values. Therefore, the challenger can now respond to the conversation oracle queries on any identity id by simulating the transcripts. This is indistinguishable from Game 4 due to the SHVZK property of the protocol. Let S 5 be the event that A wins this game, we have Pr [ S 5 ] = Pr [ S 4 ] + negl ( λ ). Cryptography 09 00053 i003
Please note that due to the special soundness property of the protocol, we know that if an adversary successfully impersonates some identity id (in Game 0) then we can extract the witness e id such that e id H = h ( id , i ) . Following the sequence of games from Game 0 to Game 5, we can use this adversary to compute e id of weight w such that e id H 0 = s j , for some j [ q ] with a negligible difference in the success probabilities of the adversary. Thus, we can find a solution to the DOOM ( n , k , q , w ) instance H 0 , s 1 , , s q . Therefore,
Adv A , IBI imp pa ( λ ) Succ DOOM + negl ( λ ) .
Hence, if the adversary A succeeds in impersonating id with a non-negligible advantage, then there exists an adversary who will succeed against DOOM or DWK . □
Yang et al. [17] had given proof that the mCFS - IBI scheme, proposed by Cayrel et al. [13], is secure under active attacks. However, we argue that their proof only holds when the scheme is executed sequentially, which inherently increases communication costs. To avoid this overhead, the scheme must be executed in parallel. Nevertheless, proving the security of the mCFS - IBI (or the Wave - IBI ) under active or concurrent attacks, in that case, is non-trivial. We recall that the difference between passive and active security consists in the Conversation and Prove oracles, where in passive attacks the challenger can always output a simulated transcript that is indistinguishable from one obtained with a real execution. However, this does not hold in the active situation where the challenger interacts with the adversary without holding a witness. Since the protocol is executed in parallel and the size of the challenge space is large, then, the probability of correctly guessing the challenge b { 0 , 1 } r is 2 r (assuming that x and σ were honestly generated), which is exponentially small. Moreover, the adversary may act maliciously, consequently making the rewinding useless, as in each rewind, the adversary may change its challenge. This issue can be addressed following the same solution proposed by Goldreich and Kahan [37], where its main idea suggests the verifier commits to its challenge before the prover sends its commitment, which indeed prevents him from changing it later during the rewinding.

4. Identity-Based Signature

There are two approaches for constructing an identity-based signature scheme: (i) turning the Wave - IBI into a signature using the Fiat–Shamir transform [22] IBI - 2 - IBS as the IBS schemes PVR - IBS [18] and m - CFS [17]. Alternatively, (ii) following the generic transformation described in [1,2,3] that was employed in the LESS - IBS [5] that combines two signature schemes SS - 2 - IBS . Following the first approach, our case can be seen as using BGKM - SIG 1 that we recall in Figure A1 where the secret key e is output by Wave . Sign . This is because our IBI is identical to BGKM - POK 1 [7] when the helper is removed via the cut-and-choose technique [38], along with optimizations. However, the resulting signatures would be on the order of hundreds of kilobytes in size since the length of the vectors involved in the scheme is n, which is a parameter of the Wave signature (see Table 2). On the other hand, following the second approach by taking Wave as the first signature and BGKM - SIG 1 as the second one yields the most efficient scheme in terms of sizes. The description of the scheme that we refer to as Wave - IBS is given in Figure 3 and Figure 4.
In particular, we instantiate the BGKM - SIG 1 recalled in Figure A1 over the ternary field, and we consider SDP in the large-weight setting, as it has been shown to be harder than the binary SDP by Bricout et al. [26].

5. Security and Parameter Selection

For constructing the Wave - IBS , two critical aspects must be considered. The first is the Wave signature employed in generating a part of the user-secret key usk ( id ) , and the second is related to BGKM - SIG 1 used for generating the final signature. For the Wave signature, it is essential to select parameters that ensure the scheme achieves a security level of λ bits. This requires addressing two types of attacks:
  • Forgery attack: in which the adversary attempts to solve the DOOM problem without the secret key.
  • Key attack: in which the adversary seeks to either retrieve the secret key or solve the DWK problem.
Several studies over the years have analyzed these two types of attacks, both in the classical setting [23,25,26,39] and, more recently, in the quantum setting by Loyer [40].
In parallel, the MPC parameters ( M , τ ) selected for the BGKM - SIG 1 must be chosen such that
max 0 i τ M i τ i · M τ 1 · 2 ( τ i ) is negligible with respect to λ .
  • For the purpose of this work, the parameters selected for our proposed Wave - IBS -I scheme shown in Table 2 are directly taken from the latest version of Wave [6], Bidoux et al. [7] for the parameters ( M , τ ) and ( n , k , w ) from [26] for BGKM - SIG 1 .
Before giving the size of the keys and the signature, in the following part, we propose an efficient method for reducing the size of large or low-weight ternary vectors. This method can be applied to the proposed Wave - IBS scheme to reduce the size of the signature and the user’s secret key, and therefore to Wave as well since they all contain large-weight ternary vectors.

5.1. Optimizing the Size of Large-Weight Ternary Vectors

Given a vector e F 3 n of a large, or low-Hamming weight w, our approach is mainly based on straightforward observations that allowed us to become closer to the entropy limit, as we explain in the following:
  • Compression:
  • Step 1: we replace all the non-zero coordinates of e with ones, hence we obtain a binary vector that we denote in this step by e F 2 n . Notice that e has the same large or low weight as the initial ternary vector e and therefore, the size of vector e can be encoded in the worst case in approximately n / 2 bits using Golomb-Rice encoding. For more details, see [41,42]. (By “worst case” we mean w = 0.106 n or w = 0.894 n . A Better compression can be achieved if w 0.106 n or w 0.894 n .)
  • Step 2: we remove all the zero entries in e , and keep the rest in the same order. Let the resulting vector be denoted by e F 3 w 0 = F 3 w . Since the multiplicative group F 3 has g = 2 as its generator, i.e., F 3 = < 2 > = { 2 0 , 2 1 } = { 1 , 1 } , we can represent the entries in e using the exponents { 0 , 1 } : replace each 1 entry with exponent 0 and each 1 with exponent 1. By doing so, the vector e becomes binary and can be encoded in w bits, i.e., e F 2 w .
  • Instead of sending e F 3 n , which can be encoded optimally in log 2 ( 3 ) n bits or in 2 n bits in bitsliced, we suggest sending ( e , e ) , which can be encoded in less than n / 2 + w bits. It is noteworthy to mention two cases in which maximum compression can be achieved:
  • Case 1: if e F 3 n has full weight, we suggest only sending e since there are no zeros in e . Hence, e can be encoded only in approximately n bits.
  • Case 2: if e F 3 n has low weight, e can be encoded in approximately n / 2 bits.
  • Decompression: is simplified in the following. Cryptography 09 00053 i004
Example 1.
For the parameters proposed in the original Wave paper [23], n = 8492 and w = 0.9397 n , the signature is σ = ( i , e ) , where i { 0 , 1 } 2 λ and e F 3 n of large weight w. Step 1 from Section 5.1 will transform the vector e F 3 n into a binary vector with the same length n and weight w.  Step   2 simply consist of keeping only the w non-zero entries of e . Since w = 0.9397 n , the vector output by  Step   1 can theoretically, according to the entropy ( h ( x ) = x log 2 ( x ) ( 1 x ) log 2 ( 1 x ) ), be encoded in around 0.3286 n bits, which indeed can be achieved using the Arithmetic encoding [43,44] or in around 0.3347 n bits using the Golomb-Rice encoding [41] with m = 8 . The vector output by  Step   2 will have size w bits.
size ( σ ) = 2 λ + size ( e ) size ( σ ) = 2 λ i + 0.3347 n step 1 + w step 2
and therefore we obtain a signature of size 1385B instead of 1683B.
Example 2.
Using the public key in its systematic form i.e., H = ( I n k | R ) F 3 ( n k ) × n where R F 3 ( n k ) × k is not only beneficial in reducing the size of the public key, but also for minimizing the size of the signature. For e = ( e 1 , e 2 ) F q n k × F 3 k ,
H = ( I n k | R ) y = e H = e 1 + e 2 R ,
so, instead of sending the whole vector e = ( e 1 , e 2 ) = ( y e 2 R , e 2 ) F 3 n as a part of σ, it can simply be replaced by e 2 F 3 k .
Now, we apply the technique from Section 5.1 to the Wavelet [45] and the recent Wave signature scheme [6] that uses the matrix H in its systematic form. The signature in these two schemes is of the form: σ = ( i , e 2 ) { 0 , 1 } 2 λ × F 3 k
size ( σ ) 2 λ i + k / 2 step 1 + E ( | e 2 | ) step 2 ,
we recall that E H ρ U w , D w is negligible, then we can say that the vector e is uniformly distributed over S w on average. Moreover,
| e 2 | = i = 1 k 1 { 1 , 1 } ( e 2 ( i ) )
where 1 { 1 , 1 } is the indicator function of the set { 1 , 1 } . By linearity of the expectation, we have,
E ( | e 2 | ) = i = 1 k E 1 { 1 , 1 } ( e 2 ( i ) ) = i = 1 k P e 2 ( i ) { 1 , 1 } = i = 1 k P ( e 2 ( i ) 0 ) = k w n
hence, size ( σ ) 2 λ + ( 0.5 + w / n ) k .
  • For the parameters proposed in Wavelet [45], n = 8492 , k = 0.66 n and w = 0.94 n , we obtain a signature of size 924B instead of 930B.
  • For the parameters proposed for Wave 822 [6] submitted to the NIST’s second call for additional digital signatures, n = 8576 , k = n / 2 and w = 0.8941 n , applying Section 5.1 led to a signature of size 777.46 B instead of 822B.
Table 3 compares signature sizes for the Wave instances obtained using our method, contrasted with sizes found in the recent wave paper [6]. Our technique consistently reduces the size of the different Wave instances submitted to the NIST, achieving compression rates ranging from 5.35 % to 10.94 % .

5.2. Key Sizes

  • The master-public key mpk is a ( n k ) × k matrix over F 3 n . This matrix can be encoded in 1.6 ( n k ) k bits, using an efficient encoding achieved through a compact representation that requires only 1.6 bits per trit (or 5 trits per byte), which is indeed close to the entropy limit log 2 ( 3 ) 1.5849 . For more details about this encoding, we advise the reader to check [6] (Appendix C.1).
  • The user-secret key is defined as usk = ( σ , sk , pk ) , where σ = ( i , e id , 2 ) replaces the earlier pair ( i , e id ) , as explained above. Here, i is a 2 λ -bit salt, e id , 2 F q k , sk is generated from a seed of λ bits, and pk has a seed of λ bits and a ternary vector of length n k .Consequently, the total size of usk is approximately less than 4 λ + 1.6 ( n k ) + 0.5 + w / n k bits.

5.3. Signature Size

The resulting transmitted signature is σ = ( pk , σ , σ ) , where pk = ( H , y ) for BGKM - SIG 1  Figure A1, σ = ( i , e id , 2 ) and σ = ( , Res ) . Furthermore, Res = ξ , ( com 3 ( i ) , θ ( i ) ) i K ¯ , res ( i ) i K for a λ -bit security. For clarity purposes, we will denote the parameters related to Wave by ( n ˜ , k ˜ , w ˜ ) , and by ( n , k , w ) for the parameters related to BGKM - SIG 1 . The size of the signature can be computed by following the optimizations described in Bidoux et al. [7] (Section 6):
  • pk of BGKM - SIG 1 is of size λ + 1.6 ( n k )
  • σ signature output by Wave . Sign ( ) is of size 2 λ + 0.5 + w ˜ n ˜ k ˜
  • is a commitment of size 2 λ bits.
  • ξ is a seed of size λ bits.
  • ( M τ ) commitment ( com 3 ( i ) ) i K ¯ of size 3 4 ( M τ ) · 2 λ bits.
  • ( M τ ) seeds ( θ ( i ) ) i K ¯ of size 3 4 ( M τ ) λ bits.
  • ( res ( i ) ) i K is of size: 2 · 7 8 · 2 λ + 2 λ + 1.6 n + w τ / 2 bits.
  • As a result, by taking M = 2 τ , we obtain a signature of size:
    Size ( σ ) = Size ( pk ) + Size ( σ ) + Size ( σ ) = λ + 2 λ + 0.5 + w ˜ n ˜ k ˜ + 1.6 ( n k ) + 2 λ + λ + 3 4 τ · 2 λ + 3 4 τ λ + ( 2.75 λ + 0.5 w + 0.8 n ) τ = 6 λ + 0.5 + w ˜ n ˜ k ˜ + 1.6 ( n k ) + ( 5 λ + 0.5 w + 0.8 n ) τ bits .
We give in Table 4 a comparison between the proposed Wave - IBS initiated with the parameters provided in Table 2, and the current existing code-based IBS . The PVR IBS archives a small usk , but at the cost of large mpk = 30 MB and msk = 35 MB for 80-bit security only. Conversely, the LESS IBS offers improved sizes, with mpk = 0.2057 MB and sk = 30.23 KB for 128-bit security; however, this improvement does not extend the usk , which remains large in comparison to the PVR IBS . The proposed Wave - IBS achieves a more balanced trade-off between these two, yielding a smaller usk = 0.896 KB and a signature size of 22 KB. Its major drawback lies in the relatively large mpk = 3.67 MB, which is essentially expected since it corresponds to the pk of Wave .

6. Conclusions

In this work, we proposed a post-quantum secure, code-based identity-based identification scheme, along with an identity-based signature scheme. Our design combines the Wave signature scheme (a previous candidate in NIST’s additional round for standardizing post-quantum digital signatures) and the BGKM - SIG 1 , which is a Stern-like signature scheme that we adapted for ternary large-weight SDP . Additionally, we proposed a technique for reducing the size of large-weight vectors over the ternary field, yielding competitive sizes compared to current code-based IBS schemes. Future work may focus on enhancing the security of the proposed IBI against active and concurrent attacks by employing the OR -proof technique, as well as extending the IBS line of research to more constructions such as identity-based threshold signatures and forward-secure identity-based signatures, since there are no such code-based constructions.

Author Contributions

Conceptualization, S.C. and M.K.; Methodology, S.C. and M.K.; Validation, S.C., M.K. and T.S.; Formal analysis, S.C. and M.K.; Investigation, S.C. and M.K.; Resources, S.C. and M.K.; Writing—original draft, S.C. and M.K.; Writing—review & editing, S.C. and M.K.; Supervision, S.C., M.K. and T.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data sharing is not applicable.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. BGKM-SIG1

Figure A1. BGKM SIG 1 signature scheme proposed by Bidoux et al. [7].
Figure A1. BGKM SIG 1 signature scheme proposed by Bidoux et al. [7].
Cryptography 09 00053 g0a1

References

  1. Shamir, A. Identity-Based Cryptosystems and Signature Schemes. In Advances in Cryptology. CRYPTO’84; Blakley, G.R., Chaum, D., Eds.; Lecture Notes in Computer Science (LNCS); Springer: Berlin/Heidelberg, Germany, 1984; Volume 196, pp. 47–53. [Google Scholar]
  2. Galindo, D.; Herranz, J.; Kiltz, E. On the Generic Construction of Identity-Based Signatures with Additional Properties. In Advances in Cryptology—ASIACRYPT 2006. ASIACRYPT 2006; Lai, X., Chen, K., Eds.; Lecture Notes in Computer Science (LNCS); Springer: Berlin/Heidelberg, Germany, 2006; Volume 4284, pp. 178–193. [Google Scholar] [CrossRef]
  3. Bellare, M.; Namprempre, C.; Neven, G. Security proofs for identity-based identification and signature schemes. J. Cryptol. 2009, 22, 1–61. [Google Scholar] [CrossRef]
  4. Shor, P.W. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994; pp. 124–134. [Google Scholar]
  5. Barenghi, A.; Biasse, J.F.; Ngo, T.; Persichetti, E.; Santini, P. Advanced signature functionalities from the code equivalence problem. Int. J. Comput. Math. Comput. Syst. Theory 2022, 7, 112–128. [Google Scholar] [CrossRef]
  6. Banegas, G.; Carrier, K.; Chailloux, A.; Couvreur, A.; Debris-Alazard, T.; Gaborit, P.; Karpman, P.; Loyer, J.; Niederhagen, R.; Sendrier, N.; et al. Wave: Round 1 Submission. 2023. Available online: https://tdalazard.io/wave_documentation.pdf (accessed on 10 June 2025).
  7. Bidoux, L.; Gaborit, P.; Kulkarni, M.; Mateu, V. Code-based signatures from new proofs of knowledge for the syndrome decoding problem. Des. Codes Cryptogr. 2023, 91, 497–544. [Google Scholar] [CrossRef]
  8. Courtois, N.; Finiasz, M.; Sendrier, N. How to Achieve a McEliece-Based Digital Signature Scheme. In Advances in Cryptology—ASIACRYPT 2001; Boyd, C., Ed.; Lecture Notes in Computer Science (LNCS); Springer: Berlin/Heidelberg, Germany, 2001; Volume 2248, pp. 157–174. [Google Scholar] [CrossRef]
  9. Stern, J. A New Identification Scheme Based on Syndrome Decoding. In Advances in Cryptology—CRYPTO’ 93; Stinson, D.R., Ed.; Lecture Notes in Computer Science (LNCS); Springer: Berlin/Heidelberg, Germany, 1994; Volume 773, pp. 13–21. [Google Scholar] [CrossRef]
  10. Niederreiter, H. Knapsack-type cryptosystems and algebraic coding theory. Prob. Contr. Inform. Theory 1986, 15, 157–166. [Google Scholar]
  11. Faugere, J.C.; Gauthier-Umana, V.; Otmani, A.; Perret, L.; Tillich, J.P. A distinguisher for high-rate McEliece cryptosystems. IEEE Trans. Inf. Theory 2013, 59, 6830–6844. [Google Scholar] [CrossRef]
  12. Cayrel, P.L.; Gaborit, P.; Girault, M. Identity-based identification and signature schemes using correcting codes. In Proceedings of the International Workshop on Coding and Cryptography, WCC, Versailles, France, 16–20 April 2007; pp. 69–78. [Google Scholar]
  13. El Yousfi Alaoui, S.M.; Cayrel, P.L.; Mohammed, M. Improved identity-based identification and signature schemes using Quasi-Dyadic Goppa codes. In Proceedings of the Information Security and Assurance: International Conference, ISA 2011, Brno, Czech Republic, 15–17 August 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 146–155. [Google Scholar]
  14. Barreto, P.S.; Cayrel, P.L.; Misoczki, R.; Niebuhr, R. Quasi-dyadic CFS signatures. In Proceedings of the International Conference on Information Security and Cryptology, Kunming, China, 14–16 December 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 336–349. [Google Scholar]
  15. Faugere, J.C.; Otmani, A.; Perret, L.; Tillich, J.P. Algebraic cryptanalysis of McEliece variants with compact keys. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, 30 May–3 June 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 279–298. [Google Scholar]
  16. Faugère, J.C.; Otmani, A.; Perret, L.; de Portzamparc, F.; Tillich, J.P. Folding alternant and Goppa Codes with non-trivial automorphism groups. IEEE Trans. Inf. Theory 2015, 62, 184–198. [Google Scholar] [CrossRef]
  17. Yang, G.; Tan, C.H.; Mu, Y.; Susilo, W.; Wong, D.S. Identity based identification from algebraic coding theory. Theor. Comput. Sci. 2014, 520, 51–61. [Google Scholar] [CrossRef]
  18. Song, B.; Zhao, Y. Provably secure identity-based identification and signature schemes from code assumptions. PLoS ONE 2017, 12, e0182894. [Google Scholar] [CrossRef] [PubMed]
  19. Cramer, R.; Damgård, I.; Schoenmakers, B. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In Advances in Cryptology—CRYPTO ’94; Desmedt, Y., Ed.; Lecture Notes in Computer Science (LNCS); Springer: Berlin/Heidelberg, Germany, 1994; Volume 839, pp. 174–187. [Google Scholar] [CrossRef]
  20. Preetha Mathew, K.; Vasant, S.; Rangan, C.P. On provably secure code-based signature and signcryption scheme. IACR Cryptol. EPrint Arch. 2012, 2012, 585. [Google Scholar]
  21. Biasse, J.F.; Micheli, G.; Persichetti, E.; Santini, P. LESS is more: Code-based signatures without syndromes. In Proceedings of the International Conference on Cryptology in Africa, Cairo, Egypt, 20–22 July 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 45–65. [Google Scholar]
  22. Fiat, A.; Shamir, A. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In Advances in Cryptology—CRYPTO’ 86; Odlyzko, A.M., Ed.; Lecture Notes in Computer Science (LNCS); Springer: Berlin/Heidelberg, Germany, 1987; Volume 263, pp. 186–194. [Google Scholar] [CrossRef]
  23. Debris-Alazard, T.; Sendrier, N.; Tillich, J.P. Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes. In Advances in Cryptology—ASIACRYPT 2019; Galbraith, S.D., Moriai, S., Eds.; Lecture Notes in Computer Science (LNCS); Springer: Berlin/Heidelberg, Germany, 2019; Volume 11921, pp. 21–51. [Google Scholar] [CrossRef]
  24. Gentry, C.; Peikert, C.; Vaikuntanathan, V. Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, Victoria, BC, Canada, 17–20 May 2008; pp. 197–206. [Google Scholar]
  25. Sendrier, N. Decoding one out of many. In Proceedings of the International Workshop on Post-Quantum Cryptography, Taipei, Taiwan, 29 November–2 December 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 51–67. [Google Scholar]
  26. Bricout, R.; Chailloux, A.; Debris-Alazard, T.; Lequesne, M. Ternary syndrome decoding with large weight. In Proceedings of the Selected Areas in Cryptography–SAC 2019: 26th International Conference, Waterloo, ON, Canada, 12–16 August 2019; Revised Selected Papers 26. Springer: Berlin/Heidelberg, Germany, 2020; pp. 437–466. [Google Scholar]
  27. Cho, J.; No, J.S.; Lee, Y.; Koo, Z.; Kim, Y.S. Enhanced pqsigRM: Code-based digital signature scheme with short signature and fast verification for post-quantum cryptography. Cryptol. Eprint Arch. 2022. [Google Scholar]
  28. Ritterhoff, S.; Maringer, G.; Bitzer, S.; Weger, V.; Karl, P.; Schamberger, T.; Schupp, J.; Wachter-Zeh, A. FuLeeca: A Lee-based signature scheme. In Proceedings of the Code-Based Cryptography Workshop, Lyon, France, 22–23 April 2023; Springer: Berlin/Heidelberg, Germany, 2023; pp. 56–83. [Google Scholar]
  29. Debris-Alazard, T.; Loisel, P.; Vasseur, V. Exploiting signature leakages: Breaking Enhanced pqsigRM. In Proceedings of the 2024 IEEE International Symposium on Information Theory (ISIT), Athens, Greece, 7–12 July 2024; pp. 2903–2908. [Google Scholar]
  30. Hörmann, F.; van Woerden, W. FuLeakage: Breaking FuLeeca by learning attacks. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2024; Springer: Berlin/Heidelberg, Germany, 2024; pp. 253–286. [Google Scholar]
  31. Attema, T.; Fehr, S. Parallel repetition of (k 1, …, k μ)-special-sound multi-round interactive proofs. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 13–18 August 2022; Springer: Berlin/Heidelberg, Germany, 2022; pp. 415–443. [Google Scholar]
  32. Kurosawa, K.; Heng, S.H. Identity-based identification without random oracles. In Proceedings of the Computational Science and Its Applications–ICCSA 2005: International Conference, Singapore, 9–12 May 2005; Springer: Berlin/Heidelberg, Germany, 2005. Part II 5. pp. 603–613. [Google Scholar]
  33. Fujioka, A.; Saito, T.; Xagawa, K. Security enhancement of identity-based identification with reversibility. In Proceedings of the Information and Communications Security: 14th International Conference, ICICS 2012, Hong Kong, China, 29–31 October 2012; Proceedings 14. Springer: Berlin/Heidelberg, Germany, 2012; pp. 202–213. [Google Scholar]
  34. NIST. Post-Quantum Cryptography: Digital Signature Schemes. Available online: https://csrc.nist.gov/projects/pqc-dig-sig (accessed on 10 June 2025).
  35. Fouque, P.A.; Hoffstein, J.; Kirchner, P.; Lyubashevsky, V.; Pornin, T.; Prest, T.; Ricosset, T.; Seiler, G.; Whyte, W.; Zhang, Z.; et al. Falcon: Fast-Fourier lattice-based compact signatures over NTRU. Submiss. NIST’s Post-Quantum Cryptogr. Stand. Process 2018, 36, 1–75. [Google Scholar]
  36. Prange, E. The use of information sets in decoding cyclic codes. IRE Trans. Inf. Theory 1962, 8, 5–9. [Google Scholar] [CrossRef]
  37. Goldreich, O.; Kahan, A. How to construct constant-round zero-knowledge proof systems for NP. J. Cryptol. 1996, 9, 167–189. [Google Scholar] [CrossRef]
  38. Beullens, W. Sigma Protocols for MQ, PKP and SIS, and Fishy Signature Schemes. In Advances in Cryptology—EUROCRYPT 2020; Canteaut, A., Ishai, Y., Eds.; Lecture Notes in Computer Science (LNCS); Springer: Berlin/Heidelberg, Germany, 2020; Part III; Volume 12107, pp. 183–211. [Google Scholar] [CrossRef]
  39. Sendrier, N. Wave parameter selection. In Proceedings of the International Conference on Post-Quantum Cryptography, College Park, MD, USA, 16–18 August 2023; pp. 91–110. [Google Scholar]
  40. Loyer, J. Quantum Security Analysis of Wave. Cryptol. Eprint Arch. 2023. Available online: https://eprint.iacr.org/2023/1263.pdf (accessed on 10 June 2025).
  41. Kiely, A. Selecting the Golomb parameter in Rice coding. IPN Prog. Rep. 2004, 42, 159. [Google Scholar]
  42. Rice, R.F. Some Practical Universal Noiseless Coding Techniques; Technical Report; National Aeronautics and Space Administration (NASA): Washington, DC, USA, 1979.
  43. Rissanen, J.; Langdon, G.G. Arithmetic coding. IBM J. Res. Dev. 1979, 23, 149–162. [Google Scholar] [CrossRef]
  44. Sayood, K. Introduction to Data Compression; Morgan Kaufmann: San Francisco, CA, USA, 2017. [Google Scholar]
  45. Banegas, G.; Debris-Alazard, T.; Nedeljković, M.; Smith, B. Wavelet: Code-based postquantum signatures with fast verification on microcontrollers. arXiv 2021, arXiv:2110.13488. [Google Scholar] [CrossRef]
Figure 1. Original Wave signature scheme [23].
Figure 1. Original Wave signature scheme [23].
Cryptography 09 00053 g001
Figure 2. Cont. One round of the Wave - IBI .
Figure 2. Cont. One round of the Wave - IBI .
Cryptography 09 00053 g002aCryptography 09 00053 g002b
Figure 3. Wave - IBS Setup.
Figure 3. Wave - IBS Setup.
Cryptography 09 00053 g003
Figure 4. Wave - IBS Signing and verification.
Figure 4. Wave - IBS Signing and verification.
Cryptography 09 00053 g004
Table 1. Estimated sizes of existing code-based IBS schemes and our proposed scheme.
Table 1. Estimated sizes of existing code-based IBS schemes and our proposed scheme.
Scheme mpk usk SignatureSecurity
PVR - IBS [18]30 MB240 bit35 MB 2 80
LESS - IBS [5] 0.20574 MB 15.43 KB 30.23 KB 2 128
Wave - IBS   (this work) 3.67739 MB 0.896 KB22 KB 2 128
Table 2. Wave - IBS ’s selected parameters for λ = 128 .
Table 2. Wave - IBS ’s selected parameters for λ = 128 .
λ nkwM τ
Wave 128857642887668--
BGKM - SIG 1 128518186518256128
Table 3. Comparison of signature sizes between different Wave instances found in [6] and those found using our technique.
Table 3. Comparison of signature sizes between different Wave instances found in [6] and those found using our technique.
Wave Instance Wave
 Signature Size
Wave + Our Technique
Signature Size
  Compression
%
Wave 822 -I822B 778 B 5.35
Wave 1249 -III1249B 1121 B 10.24
Wave 1644 -V1644B 1464 B 10.94
Table 4. Size comparison of existing and proposed code-based IBS schemes.
Table 4. Size comparison of existing and proposed code-based IBS schemes.
Scheme mpk usk SignatureSecurity
PVR - IBS [18]30 MB240 bit35 MB 2 80
LESS - IBS [5] 0.20574 MB 15.43 KB 30.23 KB 2 128
Wave - IBS   (this work) 3.67739 MB 0.896 KB22 KB 2 128
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Challi, S.; Kulkarni, M.; Serraj, T. A New Code-Based Identity-Based Signature Scheme from the Ternary Large-Weight SDP. Cryptography 2025, 9, 53. https://doi.org/10.3390/cryptography9030053

AMA Style

Challi S, Kulkarni M, Serraj T. A New Code-Based Identity-Based Signature Scheme from the Ternary Large-Weight SDP. Cryptography. 2025; 9(3):53. https://doi.org/10.3390/cryptography9030053

Chicago/Turabian Style

Challi, Sana, Mukul Kulkarni, and Taoufik Serraj. 2025. "A New Code-Based Identity-Based Signature Scheme from the Ternary Large-Weight SDP" Cryptography 9, no. 3: 53. https://doi.org/10.3390/cryptography9030053

APA Style

Challi, S., Kulkarni, M., & Serraj, T. (2025). A New Code-Based Identity-Based Signature Scheme from the Ternary Large-Weight SDP. Cryptography, 9(3), 53. https://doi.org/10.3390/cryptography9030053

Article Metrics

Back to TopTop