Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations

被引:1
作者
Fathalla, Efat [1 ]
Azab, Mohamed [2 ]
机构
[1] Virginia Mil Inst, Dept Elect & Comp Engn, Lexington, VA 24450 USA
[2] Virginia Mil Inst, Dept Comp & Informat Sci, Lexington, VA 24450 USA
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Cryptography; Security; Quantum computing; Hash functions; Resistance; Digital signatures; Computer security; Quantum algorithm; Systematics; Focusing; Post-quantum cryptography; hash-based signature; quantum-resistant algorithms; digital signatures; ONE-TIME SIGNATURES;
D O I
10.1109/ACCESS.2024.3485602
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of quantum computing poses significant risks to the security of current cryptographic systems, particularly those reliant on classical algorithms vulnerable to quantum attacks. This systematic literature review adopts the PRISMA model to critically assess the development, methodologies, and security of post-quantum hash-based signature schemes as resilient alternatives. Through a methodical selection process from leading academic databases, we identify and analyze key contributions to the field within the last decade, focusing on the schemes' security proofs, enhanced performance, and efficiency metrics. Our analysis reveals a diverse landscape of hash-based signature schemes, their evolving security features against quantum threats, and their practical implementations in securing digital communications. The review highlights the importance of advancing these quantum-resistant technologies, discusses the challenges in their adoption, and outlines future directions for research and standardization efforts. The findings aim to provide a comprehensive resource for researchers, practitioners, and policymakers involved in the transition toward secure cryptographic practices in the quantum era.
引用
收藏
页码:175969 / 175987
页数:19
相关论文
共 87 条
  • [1] Mavroeidis V., Vishi K., Zych M.D., Josang A., The impact of quantum computing on present cryptography, (2018)
  • [2] Ekera M., Hastad J., Quantum algorithms for computing short discrete logarithms and factoring RSA integers, Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017, pp. 347-363, (2017)
  • [3] Srivastava V., Baksi A., Debnath S.K., An overview of hash based signatures, Cryptol. ePrint Arch., (2023)
  • [4] Kumar M.G.V., Ragupathy U.S., A survey on current key issues and status in cryptography, Proc. Int. Conf. Wireless Commun., Signal Process. Netw. (WiSPNET), pp. 205-210, (2016)
  • [5] Mitchell C.J., The impact of quantum computing on real-world security: A 5G case study, Comput. Secur., 93, (2020)
  • [6] Mehic M., Michalek L., Dervisevic E., Burdiak P., Plakalovic M., Rozhon J., Mahovac N., Richter F., Kaljic E., Lauterbach F., Njemcevic P., Maric A., Hamza M., Fazio P., Voznak M., Quantum cryptography in 5G networks: A comprehensive overview, IEEE Commun. Surveys Tuts., 26, 1, pp. 302-346, (2024)
  • [7] Cooper D.A., Apon D.C., Dang Q.H., Davidson M.S., Dworkin M.J., Miller C.A., Recommendation for stateful hash-based signature schemes, NIST Special Publication, 800, 208, pp. 208-800, (2020)
  • [8] Li L., Lu X., Wang K., Hash-based signature revisited, Cybersecurity, 5, 1, pp. 1-26, (2022)
  • [9] Page M.J., Et al., The PRISMA 2020 statement: An updated guideline for reporting systematic reviews, Int. J. Surg., 88, (2021)
  • [10] Alhayani B.A., AlKawak O.A., Mahajan H.B., Ilhan H., Qasem R.M., Design of quantum communication protocols in quantum cryptography, Wireless Pers. Commun., (2023)