{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:36:31Z","timestamp":1760060191087,"version":"build-2065373602"},"reference-count":45,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Identity-based cryptography introduced by Shamir (Crypto\u201984) has seen many advances through the years. In the context of post-quantum identity-based schemes, most of the efficient designs are based on lattices. In this work, we propose an identity-based identification (IBI) scheme and an identity-based signature (IBS) scheme based on codes. Our design combines the hash-and-sign signature scheme, Wave, with a Stern-like signature scheme, BGKM-SIG1, instantiated over a ternary field using the large-weight Syndrome Decoding Problem (SDP). Our scheme significantly outperforms existing code-based identity-based signature constructions.<\/jats:p>","DOI":"10.3390\/cryptography9030053","type":"journal-article","created":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T07:49:58Z","timestamp":1754380198000},"page":"53","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A New Code-Based Identity-Based Signature Scheme from the Ternary Large-Weight SDP"],"prefix":"10.3390","volume":"9","author":[{"given":"Sana","family":"Challi","sequence":"first","affiliation":[{"name":"ACSA Laboratory, Department of Mathematics, Faculty of Sciences, Mohammed First University, Oujda 60000, Morocco"}]},{"given":"Mukul","family":"Kulkarni","sequence":"additional","affiliation":[{"name":"Cryptography Research Center, Technology Innovation Institute, Abu Dhabi P.O. Box 9639, United Arab Emirates"}]},{"given":"Taoufik","family":"Serraj","sequence":"additional","affiliation":[{"name":"ACSA Laboratory, Department of Mathematics, Faculty of Sciences, Mohammed First University, Oujda 60000, Morocco"}]}],"member":"1968","published-online":{"date-parts":[[2025,8,4]]},"reference":[{"key":"ref_1","first-page":"47","article-title":"Identity-Based Cryptosystems and Signature Schemes","volume":"Volume 196","author":"Blakley","year":"1984","journal-title":"Advances in Cryptology. CRYPTO\u201984"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/11935230_12","article-title":"On the Generic Construction of Identity-Based Signatures with Additional Properties","volume":"Volume 4284","author":"Lai","year":"2006","journal-title":"Advances in Cryptology\u2014ASIACRYPT 2006. ASIACRYPT 2006"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00145-008-9028-8","article-title":"Security proofs for identity-based identification and signature schemes","volume":"22","author":"Bellare","year":"2009","journal-title":"J. Cryptol."},{"key":"ref_4","unstructured":"Shor, P.W. (1994, January 20\u201322). Algorithms for quantum computation: Discrete logarithms and factoring. Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1080\/23799927.2022.2048206","article-title":"Advanced signature functionalities from the code equivalence problem","volume":"7","author":"Barenghi","year":"2022","journal-title":"Int. J. Comput. Math. Comput. Syst. Theory"},{"key":"ref_6","unstructured":"Banegas, G., Carrier, K., Chailloux, A., Couvreur, A., Debris-Alazard, T., Gaborit, P., Karpman, P., Loyer, J., Niederhagen, R., and Sendrier, N. (2025, June 10). Wave: Round 1 Submission. Available online: https:\/\/tdalazard.io\/wave_documentation.pdf."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1007\/s10623-022-01114-3","article-title":"Code-based signatures from new proofs of knowledge for the syndrome decoding problem","volume":"91","author":"Bidoux","year":"2023","journal-title":"Des. Codes Cryptogr."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/3-540-45682-1_10","article-title":"How to Achieve a McEliece-Based Digital Signature Scheme","volume":"Volume 2248","author":"Boyd","year":"2001","journal-title":"Advances in Cryptology\u2014ASIACRYPT 2001"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/3-540-48329-2_2","article-title":"A New Identification Scheme Based on Syndrome Decoding","volume":"Volume 773","author":"Stinson","year":"1994","journal-title":"Advances in Cryptology\u2014CRYPTO\u2019 93"},{"key":"ref_10","first-page":"157","article-title":"Knapsack-type cryptosystems and algebraic coding theory","volume":"15","author":"Niederreiter","year":"1986","journal-title":"Prob. Contr. Inform. Theory"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"6830","DOI":"10.1109\/TIT.2013.2272036","article-title":"A distinguisher for high-rate McEliece cryptosystems","volume":"59","author":"Faugere","year":"2013","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_12","unstructured":"Cayrel, P.L., Gaborit, P., and Girault, M. (2007, January 16\u201320). Identity-based identification and signature schemes using correcting codes. Proceedings of the International Workshop on Coding and Cryptography, WCC, Versailles, France."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"El Yousfi Alaoui, S.M., Cayrel, P.L., and Mohammed, M. (2011, January 15\u201317). Improved identity-based identification and signature schemes using Quasi-Dyadic Goppa codes. Proceedings of the Information Security and Assurance: International Conference, ISA 2011, Brno, Czech Republic.","DOI":"10.1007\/978-3-642-23141-4_14"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Barreto, P.S., Cayrel, P.L., Misoczki, R., and Niebuhr, R. (2010, January 14\u201316). Quasi-dyadic CFS signatures. Proceedings of the International Conference on Information Security and Cryptology, Kunming, China.","DOI":"10.1007\/978-3-642-21518-6_23"},{"key":"ref_15","unstructured":"Faugere, J.C., Otmani, A., Perret, L., and Tillich, J.P. (June, January 30). Algebraic cryptanalysis of McEliece variants with compact keys. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain."},{"key":"ref_16","first-page":"184","article-title":"Folding alternant and Goppa Codes with non-trivial automorphism groups","volume":"62","author":"Otmani","year":"2015","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.tcs.2013.09.008","article-title":"Identity based identification from algebraic coding theory","volume":"520","author":"Yang","year":"2014","journal-title":"Theor. Comput. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Song, B., and Zhao, Y. (2017). Provably secure identity-based identification and signature schemes from code assumptions. PLoS ONE, 12.","DOI":"10.1371\/journal.pone.0182894"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-48658-5_19","article-title":"Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols","volume":"Volume 839","author":"Desmedt","year":"1994","journal-title":"Advances in Cryptology\u2014CRYPTO \u201994"},{"key":"ref_20","first-page":"585","article-title":"On provably secure code-based signature and signcryption scheme","volume":"2012","author":"Vasant","year":"2012","journal-title":"IACR Cryptol. EPrint Arch."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Biasse, J.F., Micheli, G., Persichetti, E., and Santini, P. (2020, January 20\u201322). LESS is more: Code-based signatures without syndromes. Proceedings of the International Conference on Cryptology in Africa, Cairo, Egypt.","DOI":"10.1007\/978-3-030-51938-4_3"},{"key":"ref_22","first-page":"186","article-title":"How to Prove Yourself: Practical Solutions to Identification and Signature Problems","volume":"Volume 263","author":"Odlyzko","year":"1987","journal-title":"Advances in Cryptology\u2014CRYPTO\u2019 86"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/978-3-030-34578-5_2","article-title":"Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes","volume":"Volume 11921","author":"Galbraith","year":"2019","journal-title":"Advances in Cryptology\u2014ASIACRYPT 2019"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Gentry, C., Peikert, C., and Vaikuntanathan, V. (2008, January 17\u201320). Trapdoors for hard lattices and new cryptographic constructions. Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, Victoria, BC, Canada.","DOI":"10.1145\/1374376.1374407"},{"key":"ref_25","unstructured":"Sendrier, N. (December, January 29). Decoding one out of many. Proceedings of the International Workshop on Post-Quantum Cryptography, Taipei, Taiwan."},{"key":"ref_26","unstructured":"Bricout, R., Chailloux, A., Debris-Alazard, T., and Lequesne, M. (2019, January 12\u201316). Ternary syndrome decoding with large weight. Proceedings of the Selected Areas in Cryptography\u2013SAC 2019: 26th International Conference, Waterloo, ON, Canada. Revised Selected Papers 26."},{"key":"ref_27","unstructured":"Cho, J., No, J.S., Lee, Y., Koo, Z., and Kim, Y.S. (2022). Enhanced pqsigRM: Code-based digital signature scheme with short signature and fast verification for post-quantum cryptography. Cryptol. Eprint Arch."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Ritterhoff, S., Maringer, G., Bitzer, S., Weger, V., Karl, P., Schamberger, T., Schupp, J., and Wachter-Zeh, A. (2023, January 22\u201323). FuLeeca: A Lee-based signature scheme. Proceedings of the Code-Based Cryptography Workshop, Lyon, France.","DOI":"10.1007\/978-3-031-46495-9_4"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Debris-Alazard, T., Loisel, P., and Vasseur, V. (2024, January 7\u201312). Exploiting signature leakages: Breaking Enhanced pqsigRM. Proceedings of the 2024 IEEE International Symposium on Information Theory (ISIT), Athens, Greece.","DOI":"10.1109\/ISIT57864.2024.10619553"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"H\u00f6rmann, F., and van Woerden, W. (2024, January 18\u201322). FuLeakage: Breaking FuLeeca by learning attacks. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-031-68391-6_8"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Attema, T., and Fehr, S. (2022, January 13\u201318). Parallel repetition of (k 1, \u2026, k \u03bc)-special-sound multi-round interactive proofs. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-031-15802-5_15"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Kurosawa, K., and Heng, S.H. (2005, January 9\u201312). Identity-based identification without random oracles. Proceedings of the Computational Science and Its Applications\u2013ICCSA 2005: International Conference, Singapore. Part II 5.","DOI":"10.1007\/11424826_64"},{"key":"ref_33","unstructured":"Fujioka, A., Saito, T., and Xagawa, K. (2012, January 29\u201331). Security enhancement of identity-based identification with reversibility. Proceedings of the Information and Communications Security: 14th International Conference, ICICS 2012, Hong Kong, China. Proceedings 14."},{"key":"ref_34","unstructured":"NIST (2025, June 10). Post-Quantum Cryptography: Digital Signature Schemes, Available online: https:\/\/csrc.nist.gov\/projects\/pqc-dig-sig."},{"key":"ref_35","first-page":"1","article-title":"Falcon: Fast-Fourier lattice-based compact signatures over NTRU","volume":"36","author":"Fouque","year":"2018","journal-title":"Submiss. NIST\u2019s Post-Quantum Cryptogr. Stand. Process"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TIT.1962.1057777","article-title":"The use of information sets in decoding cyclic codes","volume":"8","author":"Prange","year":"1962","journal-title":"IRE Trans. Inf. Theory"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/BF00208001","article-title":"How to construct constant-round zero-knowledge proof systems for NP","volume":"9","author":"Goldreich","year":"1996","journal-title":"J. Cryptol."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/978-3-030-45727-3_7","article-title":"Sigma Protocols for MQ, PKP and SIS, and Fishy Signature Schemes","volume":"Volume 12107","author":"Canteaut","year":"2020","journal-title":"Advances in Cryptology\u2014EUROCRYPT 2020"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Sendrier, N. (2023, January 16\u201318). Wave parameter selection. Proceedings of the International Conference on Post-Quantum Cryptography, College Park, MD, USA.","DOI":"10.1007\/978-3-031-40003-2_4"},{"key":"ref_40","unstructured":"Loyer, J. (2025, June 10). Quantum Security Analysis of Wave. Cryptol. Eprint Arch., Available online: https:\/\/eprint.iacr.org\/2023\/1263.pdf."},{"key":"ref_41","first-page":"159","article-title":"Selecting the Golomb parameter in Rice coding","volume":"42","author":"Kiely","year":"2004","journal-title":"IPN Prog. Rep."},{"key":"ref_42","unstructured":"Rice, R.F. (1979). Some Practical Universal Noiseless Coding Techniques, Technical Report."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1147\/rd.232.0149","article-title":"Arithmetic coding","volume":"23","author":"Rissanen","year":"1979","journal-title":"IBM J. Res. Dev."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Sayood, K. (2017). Introduction to Data Compression, Morgan Kaufmann.","DOI":"10.1016\/B978-0-12-809474-7.00019-7"},{"key":"ref_45","unstructured":"Banegas, G., Debris-Alazard, T., Nedeljkovi\u0107, M., and Smith, B. (2021). Wavelet: Code-based postquantum signatures with fast verification on microcontrollers. arXiv."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/3\/53\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:23:08Z","timestamp":1760034188000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/3\/53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":45,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["cryptography9030053"],"URL":"https:\/\/doi.org\/10.3390\/cryptography9030053","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2025,8,4]]}}}