Post-Quantum Digital Signatures in Transport Documents

V. S. Moskvin
{"title":"Post-Quantum Digital Signatures in Transport Documents","authors":"V. S. Moskvin","doi":"10.1109/TIRVED56496.2022.9965491","DOIUrl":null,"url":null,"abstract":"Asymmetric cryptography plays a critical role in the security, authenticity and sustainability of widely used electronic documents on a level comparable to the security and authenticity of a traditional paper documents in transport and logistics. However, security of the majority of the asymmetric cryptographic techniques currently in use, including those used to confirm the validity of electronic documents, will be compromised due to the forthcoming development of quantum computers. The concept of a quantum computer is no longer just a theory. The race for supremacy in quantum technology is on among countries since it is the most drastic technology in the world. On a large enough quantum computer, an attacker can easily generate fake digital signatures by applying Shor’s algorithm. Digital communications and electronic transactions could be devoid of the guarantee of authenticity and non-repudiation if this vulnerability is not addressed. Post-quantum cryptography strives to provide useful techniques that are resistant to attacks utilizing quantum computers in order to address the threat to existing asymmetric cryptography. In this research, we examine the current post-quantum digital signature algorithms used to confirm the validity of an electronic document in addition to comprehending the utilization of digital signing. Overall, we conclude that in order to define the next generation of electronic documents and to address the quantum threat, it is crucial to standardize a quantum-resistant digital signature scheme.","PeriodicalId":173682,"journal":{"name":"2022 Intelligent Technologies and Electronic Devices in Vehicle and Road Transport Complex (TIRVED)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Intelligent Technologies and Electronic Devices in Vehicle and Road Transport Complex (TIRVED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TIRVED56496.2022.9965491","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Asymmetric cryptography plays a critical role in the security, authenticity and sustainability of widely used electronic documents on a level comparable to the security and authenticity of a traditional paper documents in transport and logistics. However, security of the majority of the asymmetric cryptographic techniques currently in use, including those used to confirm the validity of electronic documents, will be compromised due to the forthcoming development of quantum computers. The concept of a quantum computer is no longer just a theory. The race for supremacy in quantum technology is on among countries since it is the most drastic technology in the world. On a large enough quantum computer, an attacker can easily generate fake digital signatures by applying Shor’s algorithm. Digital communications and electronic transactions could be devoid of the guarantee of authenticity and non-repudiation if this vulnerability is not addressed. Post-quantum cryptography strives to provide useful techniques that are resistant to attacks utilizing quantum computers in order to address the threat to existing asymmetric cryptography. In this research, we examine the current post-quantum digital signature algorithms used to confirm the validity of an electronic document in addition to comprehending the utilization of digital signing. Overall, we conclude that in order to define the next generation of electronic documents and to address the quantum threat, it is crucial to standardize a quantum-resistant digital signature scheme.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
运输文件中的后量子数字签名
非对称加密在广泛使用的电子文件的安全性、真实性和可持续性方面起着至关重要的作用,其程度可与传统纸质文件在运输和物流方面的安全性和真实性相媲美。然而,目前使用的大多数非对称加密技术的安全性,包括用于确认电子文件有效性的技术,将由于即将到来的量子计算机的发展而受到损害。量子计算机的概念不再仅仅是一个理论。量子技术是世界上最激烈的技术,各国之间正在进行霸权竞争。在足够大的量子计算机上,攻击者可以很容易地利用肖尔算法生成虚假的数字签名。如果不解决这一漏洞,数字通信和电子交易可能缺乏真实性和不可否认性的保证。后量子密码学致力于提供有用的技术,以抵抗利用量子计算机的攻击,以解决对现有非对称密码学的威胁。在本研究中,除了理解数字签名的使用外,我们还研究了当前用于确认电子文档有效性的后量子数字签名算法。总之,我们得出结论,为了定义下一代电子文档并解决量子威胁,标准化抗量子数字签名方案至关重要。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Methods of Mobile Measurement, Data Collection and Analysis of Noise Near Highways Criteria for the Development of a Spatial Analytical Model of Urban Passenger Transport Routes to Ensure the Movement of Robotic Vehicles Sound Source Direction of Arrival Estimation for Autonomous Driving Applications Airfield Sweeper-Brush Machine Design Operability and Reliability Estimation Optimization of Ore Concentrate Transportation Indicators of a Mining Enterprise Based on a Logistic Analysis of Alternative Options for Organizing a Transportation System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1