Falcon (signature scheme)

Falcon is a post-quantum signature scheme selected by the NIST at the fourth round of the post-quantum standardisation process. It was designed by Thomas Prest, Pierre-Alain Fouque, Jeffrey Hoffstein, Paul Kirchner, Vadim Lyubashevsky, Thomas Pornin, Thomas Ricosset, Gregor Seiler, William Whyte, and Zhenfei Zhang.[1][2][3] It relies on the hash-and-sign technique over the Gentry, Peikert, and Vaikuntanathan framework[4] over NTRU lattices. The name Falcon is an acronym for Fast Fourier lattice-based compact signatures over NTRU.

Properties

The design rationale of Falcon takes advantage of multiple tools to ensure compactness and efficiency with provable security. To achieve this goal, the use of a NTRU lattice allows the size of the signatures and public-key to be relatively small, while fast Fourier sampling permits efficient signature computations.[5]

From a security point of view, the Gentry, Peikert, and Vaikuntanathan framework enjoys a security reduction in the Quantum Random Oracle Model.[6]

Details

All computations are done modulo a monic polynomial called of the form for some that is either 512 for Falcon-512 or 1024 for Falcon-1024. Polynomials are sometimes treated as square matricies whose th row is .[1]: 21 

The public key consists of a lattice of dimension that is described by the matrix

where is the identity matrix of dimension , is a zero matrix of the same dimension, is a polynomial modulo that is treated as a submatrix as described before. The coefficients of are reduced modulo .[1]: 21 

The corresponding private key that generates the same lattice is:[1]: 21 

Due to Falcon using a NTRU lattice, the following two equations have to hold:[1]: 21 

In order to generate a key pair, one has to generate two polynomials and that yield short vectors and solve the second equation to derive and . The public key can then be derived from calculating .[1]: 22 

In order to sign a message, the message is first hashed with a random nonce into a polynomial modulo , whose coefficients are between and . The signer then uses the private key that represents the secret lattice basis to produce two short polynomials and that satisfy . The signature is as can be recovered.[1]: 22 

Finding and without the secret basis is generally hard. Falcon uses a divide and conquer approach similar to the Fast Fourier transform with some added noise to find the two polynomials without leaking too much information about the secret basis, hence the name.[1]: 22 

The signature verification consists of calculating from the message, recovering and confirming that have a small enough Euclidean norm compared to a parameter such that holds.[1]: 45  For Falcon-512, is , while it is for Falcon-1024.[1]: 51 

The signature verification can be done entirely using integers modulo .[1]: 22  Contrarily, the signature generation uses 64 bit floats to represent calculations using complex numbers.[1]: 26 

Since consists of many coefficients close to , the signature stores a compressed version alongside the nonce, leading to a variable length signature if it is not padded.[1]: 46,50 

Implementations

The authors of Falcon provide a reference implementation in C[7] as required by the NIST[8] and one in Python for simplicity.

The set of parameters suggested by Falcon imply a signature size of 666 bytes and a public key size of 897 bytes for the NIST security level 1 (security comparable to breaking AES-128 bits). The key generation can be performed in 8.64 ms with a throughput of approximately 6,000 signature per second and 28,000 verifications per second.[1]

On the other hand, the NIST security level 5 (comparable to breaking AES-256) requires a signature size of 1,280 bytes and a public key size of 1793 bytes, a key generation under 28 ms, and a throughput of 2,900 signatures per second and 13,650 verifications per second.[1]

Use

Falcon signature was used since 2022 by Algorand[9] and Crypnut[10] blockchains.

See also

References

  1. ^ a b c d e f g h i j k l m n o Thomas Prest; Pierre-Alain Fouque; Jeffrey Hoffstein; Paul Kirchner; Vadim Lyubashevsky; Thomas Pornin; Thomas Ricosset; Gregor Seiler; William Whyte; Zhenfei Zhang, Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU (PDF)
  2. ^ Falcon official website
  3. ^ List of NIST PQC selected candidates
  4. ^ Craig Gentry; Chris Peikert; Vinod Vaikuntanathan (2008). Trapdoors for Hard Lattices and New Cryptographic Constructions. STOC.
  5. ^ Dan Boneh; Özgür Dagdelen; Marc Fischlin; Anja Lehmann; Christian Schaffner; Mark Zhandry (2011). Random Oracles in a Quantum World. Asiacrypt.
  6. ^ Reference implementation of Falcon in C
  7. ^ Implementation of Falcon in Python
  8. ^ NIST Post-Quantum Cryptography Call for Proposals
  9. ^ Algorand uses post-quantum technology
  10. ^ Crypnut blockchain combines Sodium & Falcon signature algorithms