<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2021-7-2-85-93</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-168</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ И ТЕЛЕКОММУНИКАЦИИ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>INFORMATION TECHNOLOGIES AND TELECOMMUNICATION</subject></subj-group></article-categories><title-group><article-title>Схема цифровой подписи со скрытой группой, обладающей двухмерной цикличностью</article-title><trans-title-group xml:lang="en"><trans-title>Digital Signature Scheme with Hidden Group Possessing Two-Dimensional Cyclicity</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-5039-7198</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Молдовян</surname><given-names>Д. Н.</given-names></name><name name-style="western" xml:lang="en"><surname>Moldovyan</surname><given-names>D. N.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Молдовян Дмитрий Николаевич – кандидат технических наук, научный сотрудник лаборатории кибербезопасности и постквантовых криптосистем </p><p>Санкт-Петербург, 199178</p></bio><bio xml:lang="en"><p>St. Petersburg, 199178</p></bio><email xlink:type="simple">mdn.spectr@mail.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Фахрутдинов</surname><given-names>Р. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Fahrutdinov</surname><given-names>R. Sh.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Фахрутдинов Роман Шафкатович – кандидат технических наук, заведующий лабораторией кибербезопасности и постквантовых криптосистем </p><p>Санкт-Петербург, 199178</p></bio><bio xml:lang="en"><p>St. Petersburg, 199178</p></bio><email xlink:type="simple">fahr@cobra.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Мирин</surname><given-names>A. Ю.</given-names></name><name name-style="western" xml:lang="en"><surname>Mirin</surname><given-names>A. Yu.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Мирин Анатолий Юрьевич – кандидат технических наук, старший научный сотрудник лаборатории кибербезопасности и постквантовых криптосистем</p><p>Санкт-Петербург, 199178</p></bio><bio xml:lang="en"><p>St. Petersburg, 199178</p></bio><email xlink:type="simple">mirin@cobra.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Костина</surname><given-names>А. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Kostina</surname><given-names>A. A.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Костина Анна Александровна – научный сотрудник лаборатории кибербезопасности и постквантовых криптосистем</p><p>Санкт-Петербург, 199178</p><p> </p><p> </p></bio><bio xml:lang="en"><p>St. Petersburg, 199178</p></bio><email xlink:type="simple">anna-kostina1805@mail.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский Федеральный исследовательский центр Российской академии наук<country>Россия</country></aff><aff xml:lang="en">St. Petersburg Federal Research Center of the Russian Academy of Sciences<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2021</year></pub-date><pub-date pub-type="epub"><day>25</day><month>09</month><year>2021</year></pub-date><volume>7</volume><issue>2</issue><fpage>85</fpage><lpage>93</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Молдовян Д.Н., Фахрутдинов Р.А., Мирин A.Ю., Костина А.А., 2021</copyright-statement><copyright-year>2021</copyright-year><copyright-holder xml:lang="ru">Молдовян Д.Н., Фахрутдинов Р.А., Мирин A.Ю., Костина А.А.</copyright-holder><copyright-holder xml:lang="en">Moldovyan D.N., Fahrutdinov R.S., Mirin A.Y., Kostina A.A.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/168">https://tuzs.sut.ru/jour/article/view/168</self-uri><abstract><p>Предложен способ построения схем цифровой подписи, основанных на скрытой задаче дискретного логарифмирования, удовлетворяющих общему критерию постквантовой стойкости, который обеспечивает сравнительно малые размеры открытого ключа и подписи. На основе способа разработана практичная схема цифровой подписи, в которой операция экспоненцирования в скрытой группе с двухмерной цикличностью является базовым криптографическим примитивом. Алгебраический носитель криптосхемы представляет собой четырехмерную конечную некоммутативную алгебру с ассоциативной операцией умножения. Благодаря заданию алгебры по прореженной таблице умножения базисных векторов, обеспечивается повышение производительности процедур генерации и проверки подлинности подписи. Открытым ключом является тройка четырехмерных векторов, вычисляемых как образы элементов скрытой группы, отображаемые с помощью маскирующих операций двух типов: 1) взаимно коммутативных с операцией экспоненциирования и 2) не обладающих этим свойством.</p></abstract><trans-abstract xml:lang="en"><p>A method is proposed for constructing digital signature schemes based on the hidden discrete logarithm problem, which meet ageneral criterion of post-quantum resistance. The method provides a relatively small size of the public key and signature. Based on the method, a practical digital signature scheme has been developed, in which the exponentiation operation in a hidden group with two-dimensional cyclicity is the basic cryptographic primitive. The algebraic support of a cryptoscheme is a four-dimensional finite non-commutative algebra with associative multiplication operation. By specifying algebra using abasis vector multiplication table with half of empty cells, the performance of signature generation and authentication procedures is improved. A public key is a triple of fourdimensional vectors calculated as images of elements of a hidden group which are mapped using two types of masking operations: 1) mutually commutative with the exponentiation operation and 2) not having this property.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>защита информации</kwd><kwd>компьютерная безопасность</kwd><kwd>криптография</kwd><kwd>цифровая подпись</kwd><kwd>постквантовая криптосхема</kwd><kwd>задача дискретного логарифмирования</kwd><kwd>конечная ассоциативная алгебра</kwd><kwd>некоммутативная алгебра</kwd><kwd>скрытая группа</kwd></kwd-group><kwd-group xml:lang="en"><kwd>information protection</kwd><kwd>computer security</kwd><kwd>cryptography</kwd><kwd>digital signature</kwd><kwd>post-quantum cryptoscheme</kwd><kwd>discrete logarithm problem</kwd><kwd>finite associative algebra</kwd><kwd>non-commutative algebra</kwd><kwd>hidden group</kwd></kwd-group><funding-group xml:lang="ru"><funding-statement>Работа выполнена при финансовой поддержке РФФИ в рамках научного проекта № 21-57-54001-Вьет_а).</funding-statement></funding-group><funding-group xml:lang="en"><funding-statement>This research was funded by RFBR according to the research project 21-57-54001 Viet_a.</funding-statement></funding-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Ding J., Steinwandt R. Post-Quantum Cryptography // Revised Selected Papers of the 10th International Conference (PQCrypto 2019, Chongqing, China, 8–10 May 2019). Lecture Notes in Computer Science. Security and Cryptology. Springer, 2019. Vol. 11505. 418 p.</mixed-citation><mixed-citation xml:lang="en">Ding J., Steinwandt R. Post-Quantum Cryptography. Revised Selected Papers of the 10th International Conference, PQCrypto 2019, Chongqing, China, 8–10 May 2019. Lecture Notes in Computer Science. Security and Cryptology. Springer; 2019. vol.11505. 418 p.</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Announcing Request for Nominations for Public-Key Post-Quantum Cryptographic Algorithms // Federal Register. 2016. Vol. 81. No. 244. Available from: https://www.gpo.gov/fdsys/pkg/FR-2016-12-20/pdf/2016-30615.pdf [Accessed 24th May 2021]</mixed-citation><mixed-citation xml:lang="en">Announcing Request for Nominations for Public-Key Post-Quantum Cryptographic Algorithms. Federal Register. 2016;81(244). Available from: https://www.gpo.gov/fdsys/pkg/FR-2016-12-20/pdf/2016-30615.pdf [Accessed 24th May 2021]</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Молдовян А.А., Молдовян Д.Н. Постквантовые протоколы цифровой подписи на основе скрытой задачи дискретного логарифмирования // Вопросы защиты информации. 2019. № 2(125). С. 2332.</mixed-citation><mixed-citation xml:lang="en">Moldovyan A.A., Moldovyan D.N. Post-Quantum Digital Signature Protocols Based on the Hidden Discrete Logarithm Problem. Information Security Questions (Voprosy zaŝity informacii). 2019;2(125):23-32.</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Moldovyan N.A., Moldovyan A.A. Finite Non-commutative Associative Algebras as carriers of Hidden Discrete Logarithm Problem // ВестникЮУрГУ. Серия «Математическое моделирование и программирование». 2019. Т. 12. № 1. С. 66–81. DOI:10.14529/mmp190106</mixed-citation><mixed-citation xml:lang="en">Moldovyan N.A., Moldovyan A.A. Finite Non-commutative Associative Algebras as carriers of Hidden Discrete Logarithm Problem. Bulletin of the South Ural State University. Ser. Mathematical Modelling, Programming &amp; Computer Software. 2019;12(1):66–81. DOI:10.14529/mmp190106</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Молдовян Н.А., Абросимов И.К Постквантовая схема ЭЦП на основе скрытой задачи дискретного логарифмирования в четырехмерной конечной алгебре // Вопросы защиты информации. 2019. № 2. С. 1822.</mixed-citation><mixed-citation xml:lang="en">Молдовян Н.А., Молдовян Д.Н. Постквантовая схема ЭЦП на основе скрытой задачи дискретного логарифмирования в четырехмерной конечной алгебре // Вопросы защиты информации. 2019. № 2. С. 18-22.</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Moldovyan A.A., Moldovyan N.A. Post-quantum signature algorithms based on the hidden discrete logarithm problem // Computer Science Journal of Moldova. 2018. Vol. 26. No. 3(78). PP. 301‒313.</mixed-citation><mixed-citation xml:lang="en">Moldovyan A.A., Moldovyan N.A. Post-quantum signature algorithms based on the hidden discrete logarithm problem. Computer Science Journal of Moldova. 2018;26(3(78)):301‒313.</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Shor P.W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on Quantum Computer // SIAM Review. 1999. Vol. 41. Iss. 2. PP. 303–332. DOI:10.1137/S0036144598347011</mixed-citation><mixed-citation xml:lang="en">Shor P.W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on Quantum Computer. SIAM Review. 1999;41(2):303–332. DOI:10.1137/S0036144598347011</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Ekert A., Jozsa R. Quantum computation and Shor’s factoring algorithm // Reviews of Modern Physics. 1996. Vol. 68. PP. 733. DOI:10.1103/RevModPhys.68.733</mixed-citation><mixed-citation xml:lang="en">Ekert A., Jozsa R. Quantum computation and Shor’s factoring algorithm. Reviews of Modern Physics. 1996;68:733. DOI:10.1103/RevModPhys.68.733</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Jozsa R. Quantum algorithms and the Fourier transform // Proceedings of the Royal Society A. Mathematical, Physical and Engineering Sciences. 1998. Vol. 454. Iss. 1969. PP. 323‒337. DOI:10.1098/rspa.1998.0163</mixed-citation><mixed-citation xml:lang="en">Jozsa R. Quantum algorithms and the Fourier transform. Proceedings of the Royal Society A. Mathematical, Physical and Engineering Sciences. 1998;454(1969):323‒337. DOI:10.1098/rspa.1998.0163</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Moldovyan N.A., Moldovyan A.A. Candidate for practical post-quantum signature scheme // Вестник СанктПетербургского университета. Прикладная математика. Информатика. Процессы управления. 2020. Т. 16. №. 4. С. 455–461. DOI:10.21638/11701/spbu10.2020.410</mixed-citation><mixed-citation xml:lang="en">Moldovyan N.A., Moldovyan A.A. Candidate for practical post-quantum signature scheme. Vestnik of St Petersburg University. Applied Mathematics. Computer Science. Control Processes. 2020;16(4):455–461. DOI:10.21638/11701/spbu10. 2020.410</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Moldovyan N.A. Signature Schemes on Algebras, Satisfying Enhanced Criterion of Post-quantum Security // Buletinul Academiei de Stiinte a Republicii Moldova. Matematica. 2020. No. 2(93). PP. 62‒67.</mixed-citation><mixed-citation xml:lang="en">Moldovyan N.A. Signature Schemes on Algebras, Satisfying Enhanced Criterion of Post-quantum Security. Buletinul Academiei de Stiinte a Republicii Moldova. Matematica. 2020;2(93):62‒67.</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Moldovyan N.A. Fast signatures based on non-cyclic finite groups // Quasigroups and Related Systems. 2010. Vol. 1. No. 18. PP. 83‒94.</mixed-citation><mixed-citation xml:lang="en">Moldovyan N.A. Fast signatures based on non-cyclic finite groups. Quasigroups and Related Systems. 2010;1(18):83‒94.</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Moldovyan N.A., Moldovyanu P.A. New primitives for digital signature algorithms // Quasigroups and Related Systems. 2009. Vol. 2. No. 17. PP. 271‒282.</mixed-citation><mixed-citation xml:lang="en">Moldovyan N.A., Moldovyanu P.A. New primitives for digital signature algorithms. Quasigroups and Related Systems. 2009;2(17):271‒282.</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Фахрутдинов Р.Ш., Мирин А.Ю, Молдовян Д.Н., Костина А.А. Схемы открытого согласования ключей на основе скрытой задачи дискретного логарифмирования // Информационные технологии. 2020. Т. 26. № 10. С. 577‒585. DOI:10.17587/it.26</mixed-citation><mixed-citation xml:lang="en">Fahrutdinov R.S., Mirin A. Yu., Moldovyan D.N., Kostina A.A. Public Key ‒ Agreement Schemes Based on the Hidden Discrete Logarithm Problem. Information Technologies (Informacionnye Tehnologii). 2020;26(10):577‒585. DOI:10.17587/it.26</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Гурьянов Д.Ю., Молдовян Д.Н., Молдовян А.А. Постквантовые схемы цифровой подписи: задание скрытой группы с двухмерной цикличностью // Информатизация и связь. 2020. № 4. С. 75‒82. DOI:10.34219/2078-8320-202011-4-75-82</mixed-citation><mixed-citation xml:lang="en">Guryanov D.Yu., Moldovyan D.N., Moldovyan A.A. Post-Quantum Digital Signature Schemes: Setting a Hidden Group with Two-Dimensional Cyclicity. Informatizatsiia i sviaz. 2020;4:75‒82. DOI:10.34219/2078-8320-2020-11-4-75-82</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Fast-Fourier Lattice-Based Compact Signatures over NTRU // Falcon. URL: https://falcon-sign.info (дата обращения 24.05.2021)</mixed-citation><mixed-citation xml:lang="en">Fast-Fourier Lattice-Based Compact Signatures over NTRU. Falcon. URL: https://falcon-sign.info [Accessed 24th May 2021]</mixed-citation></citation-alternatives></ref><ref id="cit17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">Dilithium Home // CRYSTALS. Cryptographic Suite for Algebraic Lattices. URL: https://pq-crystals.org/dilithium/index.shtml (дата обращения 24.05.2021)</mixed-citation><mixed-citation xml:lang="en">Dilithium Home. CRYSTALS. Cryptographic Suite for Algebraic Lattices. URL: https://pq-crystals.org/dilithium/index. shtml [Accessed 24th May 2021]</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
