Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations
The emergence of quantum computing poses significant risks to the security of current cryptographic systems, particularly those reliant on classical algorithms vulnerable to quantum attacks. This systematic literature review adopts the PRISMA model to critically assess the development, methodologies...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2024-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10731676/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1846141939075776512 |
|---|---|
| author | Efat Fathalla Mohamed Azab |
| author_facet | Efat Fathalla Mohamed Azab |
| author_sort | Efat Fathalla |
| collection | DOAJ |
| description | The emergence of quantum computing poses significant risks to the security of current cryptographic systems, particularly those reliant on classical algorithms vulnerable to quantum attacks. This systematic literature review adopts the PRISMA model to critically assess the development, methodologies, and security of post-quantum hash-based signature schemes as resilient alternatives. Through a methodical selection process from leading academic databases, we identify and analyze key contributions to the field within the last decade, focusing on the schemes’ security proofs, enhanced performance, and efficiency metrics. Our analysis reveals a diverse landscape of hash-based signature schemes, their evolving security features against quantum threats, and their practical implementations in securing digital communications. The review highlights the importance of advancing these quantum-resistant technologies, discusses the challenges in their adoption, and outlines future directions for research and standardization efforts. The findings aim to provide a comprehensive resource for researchers, practitioners, and policymakers involved in the transition toward secure cryptographic practices in the quantum era. |
| format | Article |
| id | doaj-art-efd98917f4e4490db8de66c4a5b165c6 |
| institution | Kabale University |
| issn | 2169-3536 |
| language | English |
| publishDate | 2024-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-efd98917f4e4490db8de66c4a5b165c62024-12-04T00:02:00ZengIEEEIEEE Access2169-35362024-01-011217596917598710.1109/ACCESS.2024.348560210731676Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and OptimizationsEfat Fathalla0https://orcid.org/0000-0002-0317-5733Mohamed Azab1https://orcid.org/0000-0002-9386-4726Department of Electrical and Computer Engineering, Virginia Military Institute, Lexington, VA, USADepartment of Computer and Information Sciences, Virginia Military Institute, Lexington, VA, USAThe emergence of quantum computing poses significant risks to the security of current cryptographic systems, particularly those reliant on classical algorithms vulnerable to quantum attacks. This systematic literature review adopts the PRISMA model to critically assess the development, methodologies, and security of post-quantum hash-based signature schemes as resilient alternatives. Through a methodical selection process from leading academic databases, we identify and analyze key contributions to the field within the last decade, focusing on the schemes’ security proofs, enhanced performance, and efficiency metrics. Our analysis reveals a diverse landscape of hash-based signature schemes, their evolving security features against quantum threats, and their practical implementations in securing digital communications. The review highlights the importance of advancing these quantum-resistant technologies, discusses the challenges in their adoption, and outlines future directions for research and standardization efforts. The findings aim to provide a comprehensive resource for researchers, practitioners, and policymakers involved in the transition toward secure cryptographic practices in the quantum era.https://ieeexplore.ieee.org/document/10731676/Post-quantum cryptographyhash-based signaturequantum-resistant algorithmsdigital signatures |
| spellingShingle | Efat Fathalla Mohamed Azab Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations IEEE Access Post-quantum cryptography hash-based signature quantum-resistant algorithms digital signatures |
| title | Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations |
| title_full | Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations |
| title_fullStr | Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations |
| title_full_unstemmed | Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations |
| title_short | Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations |
| title_sort | beyond classical cryptography a systematic review of post quantum hash based signature schemes security and optimizations |
| topic | Post-quantum cryptography hash-based signature quantum-resistant algorithms digital signatures |
| url | https://ieeexplore.ieee.org/document/10731676/ |
| work_keys_str_mv | AT efatfathalla beyondclassicalcryptographyasystematicreviewofpostquantumhashbasedsignatureschemessecurityandoptimizations AT mohamedazab beyondclassicalcryptographyasystematicreviewofpostquantumhashbasedsignatureschemessecurityandoptimizations |