-
196
-
195
-
128
-
124
-
120
P-CSNKS: Post-Quantum Collaborative Signature Scheme with Non-Linear Private Key Splitting Technique
DOI:
https://doi.org/10.30564/jeis.v7i2.10217Abstract
Traditional collaborative signature schemes face significant challenges in resisting quantum computing attacks, securing private keys in distributed architectures, and balancing operational efficiency, which are critical requirements for modern electronic and information systems like IoT, blockchain, and federated learning. This paper proposes P-CSNKS, a novel post-quotum collaborative signature scheme featuring a non-linear private key splitting technique. Unlike linear secret sharing, P-CSNKS partitions the master private key into multiple interdependent subkeys using multiplicative inverses and modular arithmetic, ensuring algebraic interdependencies prevent full key reconstruction even if attackers compromise sufficient shares. Simultaneously, the scheme embeds hash-based post-quantum signature components directly into the collaborative ECDSA signing workflow. This hybrid design maintains backward compatibility with standard ECDSA verification while establishing dual security layers: one for classical security and another providing provable existential unforgeability against quantum adversaries in the quantum random oracle model. Crucially, P-CSNKS achieves this quantum resistance without incurring prohibitive computational costs. Rigorous experimental evaluations demonstrate that P-CSNKS significantly outperforms lattice-based while also showing efficiency gains against hash-based scheme. The optimized algorithms for key generation, signing, and verification ensure lightweight performance suitable for latency-sensitive applications. Thus, P-CSNKS delivers enhanced security against both classical and quantum threats while meeting the stringent efficiency demands of next-generation distributed systems.
Keywords:
Collaborative Signature; Post-Quantum; Quantum Computing Attack; Private Key SplittingReferences
[1] Shor, P.W., 2002. Introduction to quantum algorithms. Proceedings of Symposia in Applied Mathematics. 58, 143–160.
[2] Lindell, Y., 2017. Fast secure two-party ECDSA signing. Proceedings of The 37th Annual International Cryptology Conference–CRYPTO 2017; August 20–24, 2017; Santa Barbara, CA, USA. pp. 613–644.
[3] Tu, B., Chen, Y., Cui, H., et al., 2024. Fast two-party signature for upgrading ECDSA to two-party scenario easily. Theoretical Computer Science. 986, 114325. DOI: https://doi.org/10.1016/j.tcs.2023.114325
[4] Xiao, Y., Zhang, L., Yang, Y., et al., 2024. Provably secure multi-signature scheme based on the standard SM2 signature scheme. Computer Standards & Interfaces. 89, 103819. DOI: https://doi.org/10.1016/j.csi.2023.103819
[5] Beimel, A., 2011. Secret-sharing schemes: a survey. Proceedings of The International Conference on Coding and Cryptology; May 30–June 3 2011; Berlin, Germany. pp. 11–46. DOI: https://doi.org/10.1007/978-3-642-20901-7_2
[6] Li, Q., Luo, M., Hsu, C., et al., 2022. A quantum secure and noninteractive identity-based aggregate signature protocol from lattices. IEEE Systems Journal. 16(3), 4816–4826. DOI: https://doi.org/10.1109/JSYST.2021.3112555
[7] Chen, X., Huang, J., Xiao, K., et al., 2025. A non-interactive identity-based multi-signature scheme on lattices with public key aggregation. IEEE Transactions on Dependable and Secure Computing. (99), 1–11. DOI: https://doi.org/10.1109/TDSC.2025.3543425
[8] Liu, S., Zhou, X., Wang, X.A., et al., 2025. A hash-based post-quantum ring signature scheme for the Internet of Vehicles. Journal of Systems Architecture. 160, 103345. DOI: https://doi.org/10.1016/j.sysarc.2025.103345
[9] Suhail, S., Hussain, R., Khan, A., et al., 2020. On the role of hash-based signatures in quantum-safe internet of things: current solutions and future directions. IEEE Internet of Things Journal. 8(1), 1–17. DOI:https://doi.org/10.1109/JIOT.2020.3013019
[10] Doerner, J., Kondi, Y., Lee, E., et al., 2018. Secure two-party threshold ECDSA from ECDSA assumptions. Proceedings of The IEEE Symposium on Security and Privacy (SP); May 20–24, 2018; San Francisco, CA, USA. pp. 980–997.
[11] Yang, Y., Yin, F., Chen, L., et al., 2025. A compact post quantum one time signature scheme over SM3 algorithm. Journal of Software. 36(10), 1–13.
[12] Johnson, D., Menezes, A., Vanstone, S., 2001. The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security. 1, 36–63. DOI: https://doi.org/10.1007/s102070100002
[13] Jiang, S., Alhadidi, D., Khojir, H.F., 2025. Key-and-signature compact multi-signatures for blockchain: A compiler with realizations. IEEE Transactions on Dependable and Secure Computing. 22(1), 579–596. DOI: https://doi.org/10.1109/TDSC.2024.3410695
[14] Wang, Y., Li, B., Wu, J., et al., 2025. An efficient multi-party signature for securing blockchain wallet. Peer-to-Peer Networking and Applications. 18(3), 1–20. DOI: https://doi.org/10.1007/s12083-025-01958-1
[15] Wang, Y., Xu, G.B., Jiang, D.H., 2025. A quantum image secret sharing scheme based on designated multi‐verifier signature. Advanced Quantum Technologies. 8(1), 2400267. DOI: https://doi.org/10.1002/qute.202400267
[16] Xu, R., Zhou, Y., Yang, Q., et al., 2024. An efficient and secure certificateless aggregate signature scheme. Journal of Systems Architecture. 147, 103030. DOI: https://doi.org/10.1016/j.sysarc.2023.103030
Downloads
How to Cite
Issue
Article Type
License
Copyright © 2025 Fei Long, Yang Li

This is an open access article under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) License.