| General | |
|---|---|
| Designers | Jorge Chavez-Saab, Maria Corte-Real Santos, Luca De Feo, Jonathan Komada Eriksen, Basil Hess, David Kohel, Antonin Leroux, Patrick Longa, Michael Meyer, Lorenz Panny, Sikhar Patranabis, Christophe Petit, Francisco Rodríguez Henríquez, Sina Schaeffler, Benjamin Wesolowski[1] |
| First published | 1 June 2023 |
| Cipher detail | |
| Key sizes | 64, 96 or 128 bytes depending on the NIST parameter set[2] |
| Structure | Supersingular isogeny graph |
| Best public cryptanalysis | |
| No known attacks. The SQIsign2D-East variant suffers from a specific vulnerability.[3] | |
SQIsign is a post-quantum signature scheme submitted to first round of the post-quantum standardisation process. It is based around a proof of knowledge of an elliptic curve[a] endomorphism that can be transformed to a signature scheme using the Fiat–Shamir transform.
It promises small key sizes between 64 and 128 bytes and small signature sizes between 177 and 335 bytes, which outperforms other post-quantum signature schemes that have a trade-off between signature and key sizes. SQIsign, however, has higher signing and verification times.[4] The original paper concluded that their C implementation takes 0.6 s for key generation, 2.5 s for a sign operation and 0.05 s or 50 ms for a verification operation.[5]
These times have been improved with new variations like SQIsign-east.[6]
The name stands for "Short Quaternion and Isogeny Signature" as it makes use of isogenies and quaternions.
Inner workings
SQIsign is a sigma protocol for a proof of knowledge that is turned into a signature scheme using the Fiat-Shamir transform. The knowledge that is proven is an elliptic curve endomorphism.[7]: 5
SQIsign primarily operates on elliptic curves. Two elliptic curves and can be connected with an isogeny , written as , which maps all elements of onto . The fundamental problem that isogeny-based cryptography like SQIsign is based on is called the isogeny path problem and can be formulated as "find an isogeny given and ", which is believed to be hard. An endomorphism of an elliptic curve is an isogeny that maps onto itself, i.e. . The set of all endomophisms of an elliptic curve is known as it's endomorphism ring, written as . The endomorphism problem can be formulated as "given , find ". Even computing a non-trivial part of is known to be as hard as computing the full . This problem is known to be as hard as the isogeny path problem for supersingular curves like the ones SQIsign uses. Furthermore, given two elliptic curves and , one can compute one of given the other two in polynomial time, i.e. the problem is easy.[7]: 5
The sigma protocol works as follows. The prover has and and publishes as their public key while keeping private. The prover then tries to convince the verifier that they know , which is hard to compute from just due to the endomorphism problem.[7]: 5
The protocol proceeds in 4 phases.
In phase 1, the prover commits to a random elliptic curve and and sends to the verifier.[7]: 5
In the second phase, the verifier generates a random isogeny and its corresponding elliptic curve . Due to the isogeny path problem, it would be hard to compute the isogeny .[7]: 5
In the third phase, the prover calculates from (i.e. their private key) and , since this problem is easy. They then calculate the isogeny that maps from the committed elliptic curve from phase 1 to the challenge elliptic curve from step 2. This can be done if and only if one knows the endomorphism ring of the prover's public key.[7]: 5
In the fourth phase, the verifier checks whether the isogeny truly maps from the committed elliptic curve to the challenge elliptic curve.[7]: 5
In order to make the sigma protocol secure, phase 4 has to be amended with a check that is not a sub-isogeny of as an attacker could otherwise cheat and provide a forged isogeny without knowing at least part of the endomorphism ring.[7]: 6
SQIsign fixes the pair and represents the private key as and the commitment as although this is computationally equivalent to the process described above.[7]: 6
The proof of knowledge protocol is transformed to a signature scheme using the Fiat-Shamir transform.[7]: 5
Security
SQIsign's security relies on the hardness of the endomorphism ring problem, which is currently considered hard.[8][9]
The authors also provide a rationale for the chosen parameters in the last chapter of the specification.[1]
While SQIsign makes use of a similar construction, the weaknesses of SIDH do not translate to it.[1]
There is a security proof for SQIsign.[10]
Implementations
There is a reference implementation hosted on GitHub.
SQIsign 2.0
The team behind SQIsign improved the original design in their round 2 submission and incorporated improvements from the SQIsign2D-West variant.[7]
This has improved the signing time by a factor of 20 and the verification time by a factor of 6 while increasing the security level and reducing the signature size by 14%.[7]: 6
Variants
There are a couple of variants based on the original SQIsign:[11]
- SQIsignHD: New dimensions in cryptography[12]
- SQIsign2D-West: The fast, the small, and the safer[13]
- SQIsign2D‑East: A new signature scheme using 2-dimensional isogenies[3]
- SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies[14]
- SQIsign2D2: Improvement upon the SQIsign2D design.[15]
References
- ^ a b c "SQIsign - Algorithm specifications and supporting documentation - Version 1.0" (PDF). Retrieved 2024-11-15.
- ^ "SQIsign - Algorithm specifications and supporting documentation - Version 1.0" (PDF). p. 4. Retrieved 2024-11-15.
- ^ a b Nakagawa, Kohei; Onuki, Hiroshi (2024). "SQIsign2D-East: A New Signature Scheme Using 2-dimensional Isogenies". Cryptology ePrint Archive. Retrieved 2024-11-17.
- ^ Westerbaan, Bas; Larisch, James; Ahmad, Suleman; Fayed, Marwan; Westerbaan, Bas; Valenta, Luke; Krivit, Alex (2021-11-08). "Sizing Up Post-Quantum Signatures". The Cloudflare Blog. Retrieved 2024-11-15.
- ^ Feo, Luca De; Kohel, David; Leroux, Antonin; Petit, Christophe; Wesolowski, Benjamin (2020). "SQISign: compact post-quantum signatures from quaternions and isogenies". Cryptology ePrint Archive. Retrieved 2024-11-18.
- ^ Nakagawa, Kohei; Onuki, Hiroshi (2024). "SQIsign2D-East: A New Signature Scheme Using 2-dimensional Isogenies". Cryptology ePrint Archive. Retrieved 2024-11-15.
- ^ a b c d e f g h i j k l "SQIsign - Algorithm specifications and supporting documentation - Version 2.0" (PDF). Retrieved May 16, 2025.
- ^ Page, Aurel; Wesolowski, Benjamin (2023). "The supersingular Endomorphism Ring and One Endomorphism problems are equivalent". Cryptology ePrint Archive. arXiv:2309.10432. Retrieved 2024-11-15.
- ^ "THE SUPERSINGULAR ENDOMORPHISM RING PROBLEM GIVEN ONE ENDOMORPHISM" (PDF). Retrieved 2024-11-15.
- ^ Aardal, Marius A.; Basso, Andrea; Feo, Luca De; Patranabis, Sikhar; Wesolowski, Benjamin (2025). "A Complete Security Proof of SQIsign". Cryptology ePrint Archive. Retrieved May 16, 2025.
- ^ "SQIsign". SQIsign. 2023-06-01. Retrieved 2024-11-17.
- ^ Dartois, Pierrick; Leroux, Antonin; Robert, Damien; Wesolowski, Benjamin (2023). "SQISignHD: New Dimensions in Cryptography". Cryptology ePrint Archive. Retrieved 2024-11-17.
- ^ Basso, Andrea; Feo, Luca De; Dartois, Pierrick; Leroux, Antonin; Maino, Luciano; Pope, Giacomo; Robert, Damien; Wesolowski, Benjamin (2024). "SQIsign2D-West: The Fast, the Small, and the Safer". Cryptology ePrint Archive. Retrieved 2024-11-17.
- ^ Duparc, Max; Fouotsa, Tako Boris (2024). "SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies". Cryptology ePrint Archive. Retrieved 2024-11-17.
- ^ Xu, Zheng; Lin, Kaizhan; Zhao, Chang-An; Ouyang, Yi (2025). "SQIsign2D$^2$: New SQIsign2D Variant by Leveraging Power Smooth Isogenies in Dimension One". Cryptology ePrint Archive. Retrieved 2025-09-03.
- ^ specifically supersingular elliptic curves
