Loquat: a SNARK-friendly post-quantum signature based on the legendre PRF with applications in ring and aggregate signatures

X Zhang, R Steinfeld, MF Esgin, JK Liu, D Liu… - Annual International …, 2024 - Springer
We design and implement a novel post-quantum signature scheme based on the Legendre
PRF, named Loquat. Prior to this work, efficient approaches for constructing post-quantum …

The Legendre pseudorandom function as a multivariate quadratic cryptosystem: security and applications

IA Seres, M Horváth, P Burcsi - Applicable Algebra in Engineering …, 2023 - Springer
Sequences of consecutive Legendre and Jacobi symbols as pseudorandom bit generators
were proposed for cryptographic use in 1988. Major interest has been shown towards …

DualRing-PRF: Post-quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs

X Zhang, R Steinfeld, JK Liu, MF Esgin, D Liu… - … on Information Security …, 2024 - Springer
Ring signatures allow a signer to anonymously sign a message on behalf of a
spontaneously formed group. It not only ensures the authenticity of the message but also …

Quantum security of the legendre prf

P Frixons, A Schrottenloher - Mathematical Cryptology, 2021 - journals.flvc.org
In this paper, we study the security of the Legendre PRF against quantum attackers, given
classical queries only, and without quantum random-access memories. We give two …

Legendre PRF (multiple) key attacks and the power of preprocessing

A May, F Zweydinger - 2022 IEEE 35th Computer Security …, 2022 - ieeexplore.ieee.org
Due to its amazing speed and multiplicative properties the Legendre PRF recently finds
widespread applications eg in Ethereum 2.0, multiparty computation and in the quantum …

Quantum time/memory/data tradeoff attacks

O Dunkelman, N Keller, E Ronen, A Shamir - Designs, Codes and …, 2024 - Springer
One of the most celebrated and useful cryptanalytic algorithms is Hellman's time/memory
tradeoff (and its Rainbow Table variant), which can be used to invert random-looking …

Cryptanalysis of the generalised Legendre pseudorandom function

N Kaluđerović, T Kleinjung, D Kostić - Open Book Series, 2020 - msp.org
Linear Legendre pseudorandom functions were introduced in 1988 by Damgård, and higher
degree generalisations were introduced by Russell and Shparlinski in 2004. We present …

Analysis of the BIKE post-quantum cryptographic protocols and the Legendre pseudorandom function

D Kostic - 2020 - infoscience.epfl.ch
The field of post-quantum cryptography studies cryptographic systems that are secure
against an adversary in possession of a quantum computer. In 2017, the National Institute of …

[PDF][PDF] Post-Quantum Building Blocks for Secure Computation–the Legendre OPRF

L Dodgson - 2023 - ethz.ch
Abstract An Oblivious Pseudo-Random Function (OPRF) is a two-party protocol for jointly
evaluating a Pseudo-Random Function (PRF), where a user has an input x and a server has …

Secret-key cryptography and impact of a quantum attacker on the telecommunication world

P Frixons - 2022 - inria.hal.science
For modern cryptography, the security of a system is defined as the sum of the resources
required to break it. With the advent of efficient quantum computers and the new algorithmic …