A digital currency that claims to be resistant to quantum computers

1,117 views
Skip to first unread message

s zhang

unread,
Oct 13, 2021, 8:51:15 AM10/13/21
to pqc-forum
Dear all, 
I recently heard about a post-quantum cryptocurrency (abcmint) whose founder claims that the technology used is approved by NIST and is the only solution. I would like to ask you all, can this really be approved and reliable by experts?

Here is the official website of abcmint, which has various information about this cryptocurrency


Best regards.
Zang

Wrenna Robson

unread,
Oct 13, 2021, 9:02:52 AM10/13/21
to s zhang, pqc-forum
It looks like this is a project whose vice-chairman is one of the co-creators of the Rainbow cryptosystem, and they use Rainbow, one of the Round 3 finalists in the digital signatures category. It is among three finalists to be considered for standardization in this category at the end of the third round. See NISTIR 8309, https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8309.pdf. I do not believe it has been approved for standardization at this time. For previous discussion on Rainbow in this forum, you should be able to use the Google Groups search functionality.

Hope this helps!

Wrenna

--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/f3023c10-89c8-4ca0-ad22-a574ee5a2ed3n%40list.nist.gov.

s zhang

unread,
Oct 13, 2021, 9:38:09 AM10/13/21
to pqc-forum, wren....@gmail.com, pqc-forum, s zhang
Thank you for your reply.
According to the documents and other information you gave, there are three digital signature algorithms shortlisted for the 3rd round of the nist pqc, namely CRYSTALS-DILITHIUM, FALCON, and Rainbow, but why does the chairman of abcmint claim that other than Rainbow, the other two algorithms are not feasible for digital currency and Internet applications. 

Zang
wren....@gmail.com 在 2021年10月13日 星期三下午9:02:52 [UTC+8] 的信中寫道:

Wrenna Robson

unread,
Oct 13, 2021, 9:40:05 AM10/13/21
to s zhang, pqc-forum
I will leave it to those more qualified than I to answer your question, but it would probably help if you could provide a link to the specific claims you mention.

Best,

Wrenna

s zhang

unread,
Oct 13, 2021, 9:45:03 AM10/13/21
to pqc-forum, wren....@gmail.com, pqc-forum, s zhang

The chairman of abcmint said it publicly at clubhouse, and his supporters are convinced of it.

Zang
wren....@gmail.com 在 2021年10月13日 星期三下午9:40:05 [UTC+8] 的信中寫道:

Wrenna Robson

unread,
Oct 13, 2021, 9:46:40 AM10/13/21
to s zhang, pqc-forum
It is quite difficult to evaluate technical claims made in a private space on a social media platform.

Best,

Wrenna

s zhang

unread,
Oct 13, 2021, 9:49:59 AM10/13/21
to pqc-forum, wren....@gmail.com, pqc-forum, s zhang
You are right, maybe this is one of his hype techniques.

wren....@gmail.com 在 2021年10月13日 星期三下午9:46:40 [UTC+8] 的信中寫道:

Wrenna Robson

unread,
Oct 13, 2021, 9:51:46 AM10/13/21
to s zhang, pqc-forum
On that I couldn't comment.

Best,

Wrenna

Yaroslav Pilshchikov

unread,
Nov 7, 2021, 12:31:36 PM11/7/21
to pqc-forum, wren....@gmail.com, pqc-forum, s zhang
Tidecoin is using Falcon-512 as a signature.

andy yi

unread,
Apr 26, 2022, 8:48:55 AM4/26/22
to pqc-forum, idqu...@gmail.com, wren....@gmail.com, pqc-forum, s zhang
1. FALCON and CRYSTALS-DILITHIUM signatures are slow, not suitable for de-cryptocurrency, and because of the publication of D. J. Bernstein's s-unit attack paper, there is currently no consensus, https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/3mVeyEfYnUY/m/ZbbXR0pnDQAJ
2. XMSS is a hash function signature, which requires very strict full-scale management, and is not suitable for decentralized encryption.
3. WOTS+ is a hash function signature
4.Rainbow signature, there are basically no attack cases at present, only the second round of NIST selection L1 was broken, and only need to upgrade parameters to defend
5.Here are some cryptocurrencies that use post-quantum signature algorithms 
(1).QRL uses XMSS 
(2).xx uses WOTS+ 
(3).TDC uses FALCON
(4). ARL uses CRYSTALS-DILITHIUM 
(5).ABC uses rainbow

Nigel Smart

unread,
Apr 26, 2022, 9:18:45 AM4/26/22
to pqc-...@list.nist.gov


On 26/04/2022 14:48, andy yi wrote:
> On Wed, 13 Oct 2021, 14:38 s zhang, <shezh...@gmail.com> wrote:
> Thank you for your reply.
> According to the documents and other
> information you gave, there are three
> digital signature algorithms shortlisted for
> the 3rd round of the nist pqc, namely
> CRYSTALS-DILITHIUM, FALCON, and Rainbow, but
> why does the chairman of abcmint claim that
> other than Rainbow, the other two algorithms
> are not feasible for digital currency and
> Internet applications.
>

This might be because the signature algorithms are not that able
to support threshold signatures, as currently defined. See...

https://eprint.iacr.org/2019/1060

Which kind of says Rainbow will be easier than the lattice based
schemes.

Personally I would not go with any oil-and-vinegar scheme now,
i.e. Rainbow, as there security claims seem to now be more debatable.

However, if one was prepared to tweak the lattice based signatures
[much like Schnorr can be seen as a tweaked form of DSA] then a
practical threshold lattice signature is possible
- https://eprint.iacr.org/2020/1110
which is "Dilithium-like".

Perhaps when NIST re-open signatures they should have "ability
to thresholdize" as an explicit design criteria?

Nigel

OpenPGP_0x7224BD3CC839656F_and_old_rev.asc
OpenPGP_signature

Doge Protocol

unread,
Apr 28, 2022, 2:48:53 PM4/28/22
to pqc-forum, hy81...@gmail.com, idqu...@gmail.com, wren....@gmail.com, pqc-forum, s zhang
Point (4) on Rainbow is not necessarily true. Please see paper by Ward Beullens:   https://eprint.iacr.org/2022/214.pdf

Snippet from the paper (snipping off some of the text, since there are formatting issues of power values in the forum editor):
"We estimate that a key recovery for the SL 1 parameter set of the third-round submission requires only a factor ... <snip>. For the parameter sets targeting NIST security levels 3 and 5, we find that the attack can be improved by combining the new technique with the rectangular MinRank attack of Beullens [4]. " 

Ruben Niederhagen

unread,
Apr 28, 2022, 8:21:31 PM4/28/22
to Doge Protocol, pqc-forum
a
On Apr 29, 2022, at 02:48, Doge Protocol <dogepr...@gmail.com> wrote:

Point (4) on Rainbow is not necessarily true. Please see paper by Ward Beullens:   https://eprint.iacr.org/2022/214.pdf

Snippet from the paper (snipping off some of the text, since there are formatting issues of power values in the forum editor):
"We estimate that a key recovery for the SL 1 parameter set of the third-round submission requires only a factor ... <snip>. For the parameter sets targeting NIST security levels 3 and 5, we find that the attack can be improved by combining the new technique with the rectangular MinRank attack of Beullens [4]. " 

The paper goes on in the same paragraph with: „Estimates of the complexities of the simple and combined attacks against the Rainbow parameter sets submitted to NIST are given in Table 1.

From said Table 1 you can see that the impact also of the combined attacks on the higher Rainbow parameter sets 3 and 5 is more moderate than on level 1 by cutting off “only” 20 bits of security from the higher parameter sets, leaving them significantly over the boundary of 128 bits with 157 and 206 bits of security respectively (for the “finals” parameter sets).

Best regards
   Ruben

Christopher J Peikert

unread,
Apr 28, 2022, 8:34:53 PM4/28/22
to Ruben Niederhagen, Doge Protocol, pqc-forum
On Thu, Apr 28, 2022 at 8:21 PM Ruben Niederhagen <ru...@polycephaly.org> wrote:

From said Table 1 you can see that the impact also of the combined attacks on the higher Rainbow parameter sets 3 and 5 is more moderate than on level 1 by cutting off “only” 20 bits of security from the higher parameter sets, leaving them significantly over the boundary of 128 bits with 157 and 206 bits of security respectively (for the “finals” parameter sets).

The NIST category 1 boundary is about 2^143 (classical) gates, not 2^128. For category 3 it is about 2^207 gates.

Table 1 gives estimated gate counts for the attacks, so its numbers can be compared against the NIST criteria, though it’s not clear to me whether/how memory figures into these numbers.

Sincerely yours in cryptography,
Chris
Reply all
Reply to author
Forward
0 new messages