Application and Implementation of Multivariate Public Key Cryptosystem in Blockchain (Short Paper)

  • Ruping ShenEmail author
  • Hong Xiang
  • Xin Zhang
  • Bin Cai
  • Tao Xiang
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 292)


Blockchain is one of the most revolutionary and innovative technologies in recent years. The traditional asymmetric encryption algorithms guarantee the security of data on blockchain. However, with the rapid development of quantum computing technologies, as long as large-scale quantum computers appear, these kind of encryption systems can be deciphered by shor algorithm in polynomial time. Therefore, blockchain technologies are going to face potential security threats. To solve this problem, the best solution at present is to replace the asymmetric encryption algorithms in the blockchain with post-quantum cryptosystems. In this paper, we apply the Rainbow algorithm with high signature efficiency to the existing Ethereum platform, and test the feasibility of the scheme by building a private chain. In addition, we compare the signature efficiency of Rainbow algorithm with ECDSA, which is expected to provide direction and inspiration for future research on blockchain resistance to quantum computing.


Blockchain Quantum computers Post-quantum cryptosystems 


Funding Information

This work was supported by National Key R&D Program of China No. 2017YFB0802000.


  1. 1.
    Jun, Z., Zhang H.-N., Tang, Y., Li, L.: Blockchain Technical Guide. China Machine Press (2016)Google Scholar
  2. 2.
    Swan, M.: Blockchain: Blueprint for a New Economy. OReilly Media Inc., Sebastopol (2015)Google Scholar
  3. 3.
    Satoshi, N.: Bitcoin: a peer-to-peer electronic cash system (2009).
  4. 4.
    Ethereum White Paper. A next-generation smart contract and decentr-alized application platform (2015). i/wiki/WhitePaper
  5. 5.
  6. 6.
    Yong, Y., Fei-Yue, W.: Blockchain: the state of the art and future trends. Acta Automatica Sin. 42(4), 481–494 (2016)Google Scholar
  7. 7.
    Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)CrossRefGoogle Scholar
  8. 8.
    Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J.Comput. 26(5), 1484–1509 (1997)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Divesh, A., Troy, L.: Quantum attacks on Bitcoin, and how to protect against them (2017). arXiv:1710.10377v1quant-ph
  10. 10.
    Quantum-Resistant Ledger (2017). QRL/QRL
  11. 11.
    Chen, L., Jordan, S., Liu, Y.-K., Moody, D., Peralta, R.: NISTIR 8105 Report on Post-Quantum Cryptography, NIST, 10.6028/NIST.IR.8105 5 (2016)Google Scholar
  12. 12.
    Post-Quantum Cryptography Round-1-Submissions, NIST (2017).
  13. 13.
    Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.): Post Quantum Cryptography. Springer, Heideberg (2009). Scholar
  14. 14.
    Stark, J.: Making sense of blockchain smart contracts (2018).
  15. 15.
    Ding, J., Gower, J.E., Schnidt, D.S.: Multivariate Public key Cryptosystems. Advances in Information Security. Springer, Boston (2006)zbMATHGoogle Scholar
  16. 16.
    Patarin, J.: The oil and vinegar signature scheme. In: Dagstuhl Workshop on Cryptography (1997)Google Scholar
  17. 17.
    Ding, J., Schmidt, D.: Rainbow, a new multivariable polynomial signature scheme. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 164–175. Springer, Heidelberg (2005). Scholar
  18. 18.
    Buterin, V.: Ethereum go-ethereum source code [EB/OL] (2018).
  19. 19.
    Petzoldt, A.: Selecting and Reducing Key Sizes for Multivariate Cryptography (2013)Google Scholar
  20. 20.
    Petzoldt, A., Bulygin, S., Buchmann, J.: CyclicRainbow – a multivariate signature scheme with a partially cyclic public key. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 33–48. Springer, Heidelberg (2010). Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  • Ruping Shen
    • 1
    Email author
  • Hong Xiang
    • 2
  • Xin Zhang
    • 1
  • Bin Cai
    • 1
  • Tao Xiang
    • 3
  1. 1.School of Big Data and Software EngineeringChongqing UniversityChongqingChina
  2. 2.Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing University, Ministry of EducationChongqingChina
  3. 3.School of Computer ScienceChongqing UniversityChongqingChina

Personalised recommendations