Abstract:
A new criterion of post-quantum security is used to design a practical signature scheme based on the computational complexity of the hidden discrete logarithm problem. A $4$-dimensional finite non-commutative associative algebra is applied as algebraic support of the cryptoscheme. The criterion is formulated as computational intractability of the task of constructing a periodic function containing a period depending on the discrete logarithm value. To meet the criterion, the hidden commutative group possessing the $2$-dimensional cyclicity is exploited in the developed signature scheme. The public-key elements are computed depending on two vectors that are generators of two different cyclic groups contained in the hidden group. When computing the public key two types of masking operations are used: $i)$ possessing the property of mutual commutativity with the exponentiation operation and $ii)$ being free of such property. The signature represents two integers and one vector $S$ used as a multiplier in the verification equation. To prevent attacks using the value $S$ as a fitting element the signature verification equation is doubled.