<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>ORCID:</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Digital Signature Design Using Verkle Tree</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maksim Iavich</string-name>
          <email>miavich@cu.edu.ge</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tamari Kuchukhidze</string-name>
          <email>tamari.kuchukhidze@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, Caucasus University</institution>
          ,
          <addr-line>0102</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>International Black Sea University</institution>
          ,
          <addr-line>0131</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1997</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>A significant amount of research has been done on quantum computers recently. Many of the current public key cryptosystems can be broken if humanity ever develop a powerful quantum computer. Such cryptosystems are used in a lot of commercial items nowadays. Solutions have been developed that appear to defend us from quantum attacks, but they cannot be applied in real life due to safety and efficiency issues. Hash-based digital signature methods are discussed in the article. Based on the Merkle tree, digital signatures are examined. The paper analyzes the new concepts utilizing vector commitments and Verkle tree. The authors of this article provide novel technology of creating a digital signature scheme employing cutting-edge technology, Verkle tree. The authors offer the drawbacks of the scheme. The authors also provide the concepts of post-quantum signature design using Verkle Tree. quantum, quantum cryptography, signature schemes, Merkle tree, vector commitments, Verkle</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>CEUR
ceur-ws.org
tree.</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        Quantum computing will take over and become more widespread as time goes on. Quantum encryption,
also known as post-quantum cryptography, is a cryptographic method for conventional computers that can
fend off attacks from quantum computers. Computers will be able to carry out complex calculations
considerably more quickly than traditional computers if they can take advantage of the special capabilities
of quantum mechanics. It seems obvious that a quantum computer might do certain types of sophisticated
calculations in a couple of hours. It is notable that a classical computer takes several years to accomplish
these computations [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Most, if not all, currently in use traditional cryptosystems will likely be rendered useless by quantum
computers. Cryptosystems based on the integer factorization problem (RSA) are commonly employed in
reality nowadays, yet they do not resist quantum computer assaults. The RSA cryptosystem is utilized in a
wide range of products and applications. This cryptosystem is now implemented into a growing number of
commercial products. Since the RSA method is mostly used in encryption technology, it can be regarded
as one of the most prevalent public key cryptosystems that develops with technology [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>There have been a number of suggested alternatives to RSA systems, but none of them can be utilized
in practice because of security or performance difficulties. Hash-based signature schemes are one of several
that have been suggested. Since random numbers are employed as the starting random sequence of systems,
their security depends on the hash function's ability to resist collisions. Designing and putting into practice
secure and effective post-quantum cryptosystems takes a lot of work.</p>
      <p>
        The world's top scientists are working to create and refine quantum computers, yet even improved
systems are vulnerable to powerful attacks [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The development of a cryptosystem that is suitable with
both regular and post-quantum cryptography is our key objective. Yet it is equally critical that our systems
are efficient, requiring less computational power and taking up little space on servers.
      </p>
      <p>
        As quantum computing takes over, RSA and other asymmetric algorithms won't be able to keep our
personal information secure. We are working to develop post-quantum systems because of this [
        <xref ref-type="bibr" rid="ref4 ref5">4,5</xref>
        ].
INFORMATION SOCIETY AND UNIVERSITY STUDIES (IVUS 2023), 12 May 2023, Kaunas, Lithuania
      </p>
      <p>2023 Copyright for this paper by its authors.</p>
      <p>In practice, traditional digital signature schemes are vulnerable to quantum computer assaults. We are
aiming to create RSA substitutes that are impervious to quantum computer assaults. Digital signature
schemes based on hashes are one of the options. These programs employ a cryptographic hash function.
The collision resistance of the hash algorithms used in these digital signature systems is what makes them
secure. The hash-based Digital Signature Schemes are one RSA substitute. These systems' safety is
dependent on how secure their cryptographic hash functions are.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Literature Review</title>
      <p>
        Quantum computers can quickly break the encryption techniques now in use. As a result, assaults using
quantum computers can now defeat conventional encryption techniques. Digital signature techniques that
can withstand attacks from quantum computers are presented in this article [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The study [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] covers
oneway functions as well as one-time signature techniques. In the paper [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], a McEliece public-key encryption
system implementation with algorithmic and parameter choices is covered, along with the state of
cryptanalysis at the time.
      </p>
      <p>
        Researchers are looking towards quantum computers, according to article [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Cryptosystems based on
the integer factoring problem can be cracked by quantum computers. It suggests that the RSA system, one
of the best-known public-key cryptosystems, is vulnerable to attack by quantum computers. In [
        <xref ref-type="bibr" rid="ref5">5,</xref>
        ] various
QRNG integration techniques are presented. The authors of articles [
        <xref ref-type="bibr" rid="ref6 ref7">6–9</xref>
        ] go over different quantum
number generator-based hash-based digital signature techniques. The Merkle scheme is detailed in article
[10]. The use of vector commitment is described in papers [11–13]. Verkle trees are described in this study
[11].
      </p>
      <p>So LDOTS key generation requires 2n evaluations of f. The signature and verification keys are n-length
2n-bit strings. In case of LDOTS signature generation, document   {0,1}∗ is signed using LDOTS with
signature key X. let's  ( ) =  = (  −1, … ,  0) is the message digest of M. The LDOTS signature is</p>
      <p>= (  −1[  −1], … ,  1[ 1],  0[ 0])  {0,1}( , ).</p>
      <p>This signature is made up of n bit strings of length n. As message digest function d, they are chosen. In
most cases, hashes per second are used to measure how many cryptographic operations a processor can do</p>
    </sec>
    <sec id="sec-4">
      <title>3. Hash-based one-time signature schemes</title>
      <p>
        Hash-based one-time signature methods offer particularly promising possibilities for the post-quantum
era. We take into consideration signature schemes whose security is dependent solely on the cryptographic
hash function's ability to resist collisions. The Lamport-Diffie one-time signature (LDOTS) system is an
example [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. While constructing randomized algorithms and protocols, it is believed that computers have
access to a stream of truly random bits (that is a sequence of independent and unbiased coin tosses). In
actual implementations, a sample is drawn from a "source of randomness" to generate this sequence [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        We assume that Lamport-Diffie one-time signature’s security parameter n is a integer. LDOTS uses a
one-way function  ∶ {0,1} → {0,1} and cryptographic hashing function  ∶ {0,1} → {0,1} to
generate an LDOTS key pair, the LDOTS signature key X consists of a string of 2n bits of length n. X is
chosen randomly:
 = (  −1[0],   −1[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], … ,  1[0],  1[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ],  0[0],  0[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ])
{0,1}( ,2 )
The LDOTS verification key is Y
To calculate the key, we use the one-way function f:
 = (  −1[0],   −1[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], … ,  1[0],  1[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ],  0[0],  0[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]) {0,1}( ,2 )
  [ ] =  (   [ ]), 0 ≤  ≤  − 1,  = 0,1.
(1)
(2)
(3)
at any one moment [8]. The i-th bit string of this signature is xi[0], but if the i-th bit in d is 0, i-th bit string
of this signature is xi[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The signature does not require the evaluation of f. The signature length is n2.
      </p>
      <p>In the case of LDOTS verification, if we want to verify the signature of M,  =
(  −1, … ,  0 ), verifier calculates the message digest  = (  −1, … ,  0). Then, it is determined
whether it is or not:
( (
 −1), … ,  (
0)) = (  −1[  −1], … ,  0[ 0]).
(4)</p>
      <p>LDOTS generates keys and signatures fairly quickly, however the signature size is quite huge. To
decrease the size of signatures, the Winternitz one-time signature scheme (WOTS) is suggested. The
concept is to sign multiple bits in a message digest using a single string, or a single string in a one-time
signature key. WOTS utilizes a cryptographic hashing function and a one-way function, just like LDOTS.</p>
      <p>One-time signature approaches are insufficient for most real-world scenarios since each key pair can
only be used once for a signature. Ralph Merkle presented a solution to this problem. He suggests using a
whole binary hash tree. The idea is to use a full binary hash tree to restrict the validity of an arbitrary but
fixed number of one-time verification keys to a single public key, the hash tree's root.</p>
    </sec>
    <sec id="sec-5">
      <title>4. Merkle tree authentication scheme</title>
      <p>One-time signature schemes are very inconvenient to use, because to sign each message, we need to use
a different key pair. The problem with such schemes are that they require to store n digests. For everyday
use it is impractical, and we would like a scheme that allows us to store a uniform-sized digest, no matter
how many files we have. Merkle Tree was proposed to solve this problem. By using a binary tree as the
root, this approach can replace a large number of verification keys with a single public key. A cryptographic
hash function and a one-time Lamport or Winternitz signature scheme are used in this system.</p>
      <p>Merkle signature scheme (MSS) works for any cryptographic hash function and any one-time signature
scheme. We assume that  ∶ {0,1}∗ → {0,1} is a cryptographic hashing function and the one-time
signature scheme is already selected.</p>
      <p>When generating the MSS key pair, the signer chooses  ∈ ℕ,  ≥ 2. Then the key pair is generated.
Using them, it will be possible to sign/verify 2 documents. Note that this is a significant difference from
signature schemes such as RSA and ECDSA, where many documents can potentially be signed/verified
with just one key pair. However, in practice this number is also limited by the devices with which the
signature is created or by certain policies [9].</p>
      <p>The signer will generate 2 unique key pairs (  ,   ), 0 ≤  &lt; 2 . Here,   is the signature key and  
is the verification key. Both of them are bit strings. The leaves of the Merkle tree are  (  ), 0 ≤  &lt; 2 .
The internal nodes of a Merkle tree are calculated according to the following rule: a parent node is the hash
value of the concatenation of its left and right children. The MSS public key is the root of the Merkle tree.
The MSS secret key is a sequence of 2 one-time signature keys [10].</p>
      <p>This figure shows an example where the height of the Merkle tree is H=3.
Generating an MSS key pair requires computing 2 unique key pairs and evaluating a 2 +1 − 1 hash
function.</p>
      <p>It is not necessary to store the full hash tree to compute the root of a Merkle tree. Instead, the tree hash
algorithm is used. The basic idea of this algorithm is to sequentially compute the leaves and when we can
compute their parents as well.</p>
      <p>This shows the order in which Merkle tree nodes are computed by the tree hash algorithm. In this
example, the maximum number of nodes stored on the stack is 3. This happens after node 11 is created and
pushed onto the stack. To compute the root of a Merkle tree of height H, the tree hash algorithm requires
2 calls, and 2 − 1 evaluations of the hash function.</p>
      <p>MSS successfully uses one-time signing keys for signature generation. To sign a message on M, we
must first compute the n-bit  =  ( ). The signer then generates a one-time signature  OTS using the
s-th one-time signature key   ,  ∈ {0, … , 2 − 1}. A Merkle signature contains this one-time signature and
the corresponding one-time verification key   . To prove the authenticity of   , the signer also appends the
index s and the authentication path to the verification key   . This index and the authentication path allow
the verifier to construct a path from the leaf  (  ) to the root of the Merkle tree. A node h in the
authorization path is a sibling node of height h, which is the path from the leaf  (  ) to the root of the
Merkle tree.</p>
      <p>For ℎ = 0, …  − 1 figure 3 shows an example of s=3. So, the s-th merkle signature is</p>
      <p>OTS,   ,, (
0, … , 
 −1))
(5)</p>
      <p>The dashed nodes denote the authentication path of the leaf  ( 3). Arrows indicate the path from the
leaf  ( 3) to the root.</p>
      <p>Merkle's signature verification involves two steps. In the first step, the verifier uses the one-time
verification key   to verify d's signature  OTS by means of the corresponding one-time signature
scheme verification algorithm. At the second stage, the verifier checks the reliability of the one-time
verification key   .</p>
      <p>Merkle Trees are computationally fast, and a Merkle Tree over n nodes can be constructed in O(n) time.
Merkle Tree that contains many nodes can have Merkle proofs that are then prohibitively large. To sign 2n
messages the height of the tree must be n. The Merkle Proof itself might put a significant and expensive
strain on our local storage.</p>
    </sec>
    <sec id="sec-6">
      <title>5. Merkle Tree vs Verkle Tree</title>
      <p>Verkle trees are a powerful upgrade to Merkle trees that allow for much smaller verifications and are
more efficient. The structure of the Verkle tree is very similar to the Merkle Patricia tree [11].</p>
      <p>The main idea of the Verkle Tree is that we can build a Merkle Tree but substitute Cryptographic Hash
functions with Vector Commitments. First, we decide how many pieces to divide our tree into, k. Then
compute a Verkle Tree across a number of files, including f0, f1, ..., fn. Then, after dividing our files into k
subgroups, we compute a Vector Commitment, or VC, over each of the subsets of files. Additionally, we
determine each Vector Commitment membership proofs PRi with regard to VC for each file fi in the subset.
Following that, we compute Vector Commitments across previously computed commitments up the tree
until we compute the root commitment [12].</p>
      <p>In Fig 4, we have 9 files and branching factor k = 3. We divide the files into subsets of size k = 3, a
Vector Commitment is computed over each subset along with the corresponding membership proofs. This
leaves us with the commitments VC1, CV2, and VC3. We compute the Vector Commitment VC4 over these
three commitments along with the membership proofs PR9, PR10, and PR11 for the commitments VC1, VC2,
and VC3 respectively with respect to the commitment VC4. The digest of the Verkle Tree is the root
commitment, which is VC4 in this case.</p>
      <p>Fig. 4. A verkle tree when</p>
      <p>As previously stated, the Verkle tree is an improved variant of the Merkle tree. Both sorts of trees have
unique characteristics, especially when it comes to offering Merkle and Verkle proofs. The whole set of
sister nodes in a Merkle tree, including Merkle Patricia trees, constitutes the evidence of a value. The proof
must include all nodes in the tree that have any parent node in common with the node you are attempting
to prove.</p>
      <p>Verkle tree differs from Merkle tree in that you simply need to provide the path plus a small amount of
additional information as proof - you don't even need to include sibling nodes. This is why Verkle trees
profit from larger width while Merkle Patricia trees do not: in both situations, a tree with greater width
leads to shorter routes, but in a Merkle Patricia tree, this effect is overcome by the increased cost of needing
to provide all the width -1 sister node per level in a proof. This cost is absent in a Verkle tree.</p>
      <p>In a verkle tree, an inner node is computed from its children using a hash function other than a standard
hash. A vector commitment is used instead. This small parameter is what we'll use as proof. The primary
proposition of the Verkle tree is that a Merkle tree can be obtained by replacing the cryptographic hash
functions with vector commitments. Similar to a Merkle tree, a Verkle tree accomplishes the same thing.
The main difference is that they are substantially more efficient in terms of size in bytes.</p>
    </sec>
    <sec id="sec-7">
      <title>6. Vector Commitments</title>
      <p>Instead of committing to individual messages, Vector Commitment (VC) allows users to commit to an
ordered list of q values (i.e., a vector). This is done in such a way that it will later be feasible to open the
commitment with respect to particular positions (for example, to prove that   is the  -th committed
message). To be more specific, vector commitments are necessary to meet position binding. An adversary
should not be able to open a commitment to two separate values at the same location, according to the
concept of position binding. We require VCs to be concise, which means that the length of the commitment
string and the size of each opening must be independent of the vector length [13].</p>
      <p>Vector commitments may additionally need to possess the "hiding property," which states that even after
viewing certain openings, it should be impossible to tell if a commitment was made to the vectors
( 1, … ,   ) or to ( 1′, … ,  ′ ). The implementation of vector commitments does not, however, depend
much on the hiding property.</p>
      <p>Furthermore, required is the ability to update Vector Commitments. They are provided with two
algorithms to update the commitment and the accompanying openings, to put it crudely. The first approach
enables the committer to acquire a (modified) Com' containing the updated message when updating a
commitment Com by altering the  -th message from   to  
position j with respect to Com may update their evidence according to the second method in order to make
′. Holders of an opening for a message at
it legitimate with respect to the new Com'.</p>
      <p>We can make advantage of the conventional and well-established RSA assumption to realize Vector
Commitment. Compact and effective solutions made possible by vector commitment significantly
outperform earlier studies in terms of the effectiveness of the resulting solutions, the "quality" of the
underlying assumption, or both [14].</p>
      <p>is negligible in  .
following algorithms:</p>
      <sec id="sec-7-1">
        <title>Otherwise it returns 0.</title>
        <p>VC.Update  
 = ( ,  ′,  ).</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>7. Vector Commitments based on RSA</title>
      <p>If an integer N is the product of two different prime numbers  ,  , it is known as the RSA modulus. We
have a random number  ∈ ℤ , a public RSA modulus N, a public exponent  , and god ( ,  ( )) = 1. To
solve the RSA problem, one must determine the one and only  ∈ ℤ such that  =   mod  . The public
exponent  can be chosen based on multiple distributions, and different distributions result in different
variants of the problem. We take into account the RSA problem where  is picked at random from a ( +
1)-bit prime (for some parameter  ). Formally speaking, the related RSA assumption reads as follows.</p>
      <p>We have RSA Assumption. Let N be a random RSA modulus of length k, z be a random element in ℤ ,
and  be a ( + 1)-bit prime (for some parameter  ),  ∈ ℕ is security parameter. The RSA assumption is
then considered to be valid if for each PPT adversary  , the probability</p>
      <p>Pr [ ←  ( ,  ,  ):   =  mod  ]
We offer vector commitment realization based on the RSA assumption. It can be described with
VC.KeyGen (1 ,  ,  ) Randomly choose two  /2-bit primes  1,  2,  =  1 2, and then choose  ( +
1)-bit primes  1, … ,   that do not divide  ( ). For  = 1 to  set
The public parameters pub is ( ,  1 1, … ,   ,  1, … ,   ). The message space is 
= {0,1}ℓ
VC.Compub( 1, … ,   ) Compute
  =  ΠΠ</p>
      <p>=1, ≠  
 ←  1 1 ⋯  
 
and output  and the auxiliary information aux = ( 1, … ,   ).</p>
      <p>VC.Open</p>
      <p>( ,  , aux ), Compute
VC.Verpub( ,  ,  , Λ ) The verification algorithm returns 1 if 
∈ 
and
Notice that knowledge of pp allows to compute   efficiently without the factorization of  .
  ← 5√∏ =1, ≠
  

  mod 
 =</p>
      <p>Λ  mod 
( ,  ,  ′,  ) Compute the updated commitment   =  ⋅     − . Finally output  ′ and
(6)
(7)
(8)
(9)
(10)
to produce a new proof Λ′ which will be valid with respect to  ′.</p>
      <p>VC.ProofUpdate pUB( , Λ ,  ′,  ,  ) A client who owns a proof Λ , that is valid with respect to to  for
some message at position  , can use the update information  to compute the updated commitment  ′ and
We distinguish two cases:
1.  ≠  . Compute the updated commitment as  ′ =     ′−
while the updated proof is Λ′ =

A √  ′− (notice that such   -th root can be efficiently computed using the elements in the

2.  =  . Compute the updated commitment  ′ =  ⋅    ′−
while the updated proof remains the
exponents  1, … ,   .</p>
      <p>In order for the verification process to be correct, notice that one should also verify (only once) the
validity of the public key by checking that the   's are correctly generated with respect to  and the</p>
      <p>A drawback of this scheme is that the size of the public parameter pp is  ( 2), the size of the public
parameters is linear in q. This can be important in scenarios where big datasets are used with vector
commitment. Also, this construction can be easily optimized in such a way that the verifier stores only a
constant number of elements, instead of the entire public parameters. The signature is computed on
( ,   ,   ).</p>
      <p>public key).</p>
      <p>same   .</p>
    </sec>
    <sec id="sec-9">
      <title>8. Novel scheme using Verkle Tree</title>
      <p>Because a different key pair must be used to sign each message, one-time signature schemes are
particularly demanding to employ. These systems have the drawback of requiring n digests to be stored.
We would like a system that enables us to save a uniform-sized digest regardless of the number of files we
have because it is prohibitive for regular use. The Merkle Tree was suggested as a solution to this issue.
This method can replace numerous verification keys with a single public key by employing a binary tree as
the root.</p>
      <sec id="sec-9-1">
        <title>Merkle Proof itself.</title>
        <p>A Merkle Tree with n nodes can be built in O(n) time because Merkle Trees are computationally quick.
A Merkle tree with many nodes can result in prohibitively huge Merkle proofs. To sign 2n messages the
height of the tree must be n. Our local storage may experience a large and costly strain as a result of the</p>
        <p>Merkle proofs can be greatly improved by Verkle trees, which enable significantly reduced proof sizes.
The verifier simply needs to offer a single proof that demonstrates all parent-child ties between all
commitments along the paths from each leaf node to the root, as opposed to having to present all "brother
nodes" at every level. When compared to optimal Merkle trees, proof sizes can be reduced by a factor of
6–8, and when compared to Merkle Patricia trees, proof sizes can be reduced by a factor of more than 20–
30.</p>
        <p>Instead of the Merkle tree, we use the Verkle tree.</p>
        <p>When generating the key pair, the signer chooses  ∈ ℕ, 
≥ 2. Then the key pair is generated. Using

them, it will be possible to sign/verify 2

documents. The signer will generate 2
unique key pairs
(  ,   ), 0 ≤  &lt; 2 . Here,   is the signature key and   is the verification key. Both of them are bit strings.
The leaves of the Verkle tree are  (  ), 0 ≤  &lt; 2 . They are computed and used as the leaves of the tree
and each node in the tree is a hash value of of its children’s concatenation. The public key of the Verkle
crypto system is the root commitment. To generate public key 2 pairs of keys must be computed.</p>
        <p>We can use one-time signing keys signature generation. To sign a message on M, we must first compute
the n-bit</p>
        <p>=  ( ). Firstly, arbitrary size message m is transformed into size n by means of the hash
function. Document's signature will be the concatenation of: one-time signature, one-time verification key,
index s for the proof and the root commitment.</p>
        <p>In Verkle's signature verification, verification is done as follows: the one-time signature of 
should
to root commitment, the signature is verified. In verkle tree root commitment is digest.
be verified using   . After this, if it is true, the commitments VCi are verified. If the root of the tree is equal</p>
      </sec>
    </sec>
    <sec id="sec-10">
      <title>9. Conclusion</title>
      <p>We discussed currently available random number generation tools for both classical and quantum cases.
The post-quantum cryptography systems were covered. We discussed hashing-based one-way functions,
their integration into Merkle. We discussed vector commitment and commitments based on RSA
assumption. We discussed powerful upgrade of the Merkle tree - Verkle tree, how it is computed and
integrated. Novel shames, their efficiency, created a new model and integrated it into Verkle. They do
require more complex cryptography to implement, but they present the opportunity for large gains to
scalability.</p>
      <p>It is important for us that the resulting schemes protect us from both classical and quantum computer
attacks. After reviewing the tasks performed, we got the systems that are integrated into Merkle. Merkle
Trees, which are built using cryptographic hash functions, are a good solution to protect against quantum
attacks, but the verification size is too large. A parent node in a Merkle tree is the hash of its children. We
have an improvement Verkle Tree, where a parent node in a Verkle Tree is the vector commitment of its
children. To implement the new technology, we discussed vector commitment and commitments based on
RSA assumption.</p>
      <p>The Verkle scheme is a powerful upgrade of the Merkle scheme that allows for much smaller
verifications. Instead of providing all nodes at each level, verification only needs one proof to validate all
parent-descendant relationships - all commits from each leaf node to the root. This allows the verification
size to be reduced by about 6-8 times compared to the classical Merkle scheme.</p>
      <p>In our updated schemes we used Verkle tree instead of Merkle tree. In this case, only a small parameter,
vector commitment, is needed to use as proof. We used vector commitments based on the RSA assumption
to build the Verkle tree.</p>
      <p>As previously stated, it is critical that the resulting methods defend us from attacks by quantum
computers. Unfortunately, so far Vector commitments based on RSA can be broken by quantum computers.
We are improving the scheme to make it more secure and efficient. In the future, we plan to create electronic
signature schemes that will use verkle trees, but we will use lattices to build vector commitments. Our
schemes will be based on post-quantum assumptions.
10. Acknowledgement</p>
      <p>This work was supported by Shota Rustaveli National Science Foundation of Georgia (SRNSF) [STEM
– 22 -1076]
11.References
[8] Iavich, Maksim, et al. "Improvement of Merkle signature scheme by means of optical quantum random
number generators." Advances in Computer Science for Engineering and Education III 3. Springer
International Publishing, 2021.
[9] Iavich, Maksim, Avtandil Gagnidze, and Giorgi Iashvili. "Hash based digital signature scheme with
integrated TRNG." CEUR Workshop Proceedings. 2018.
[10] Merkle, Ralph C. "A digital signature based on a conventional encryption function." Advances in</p>
      <p>Cryptology—CRYPTO’87: Proceedings 7. Springer Berlin Heidelberg, 1988.
[11] Chen, H.; Liang, D. Adaptive Spatio-Temporal Query Strategies in Blockchain. ISPRS Int. J. Geo-Inf.</p>
      <p>2022, 11, 409. https://doi.org/10.3390/ijgi11070409
[12] Weijie Wang, Yale University Annie Ulichney, Yale University Charalampos Papamanthou, Yale
University, BalanceProofs: Maintainable Vector Commitments with Fast Aggregation, Cryptology
ePrint Archive, 2022
[13] Kurosawa, Kaoru, and Goichiro Hanaoka, eds. Public-Key Cryptography--PKC 2013: 16th
International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary
26--March 1, 2013, Proceedings. Vol. 7778. Springer, 2013.
[14] Kuszmaul, John. "Verkle trees." Verkle Trees 1 (2019).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <surname>Lily</surname>
          </string-name>
          , et al.
          <article-title>Report on post-quantum cryptography</article-title>
          . Vol.
          <volume>12</volume>
          .
          <string-name>
            <surname>Gaithersburg</surname>
            ,
            <given-names>MD</given-names>
          </string-name>
          , USA: US Department of Commerce,
          <source>National Institute of Standards and Technology</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Buchmann</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dahmen</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Szydlo</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2009</year>
          ).
          <article-title>Hash-based Digital Signature Schemes</article-title>
          . In: Bernstein,
          <string-name>
            <given-names>D.J.</given-names>
            ,
            <surname>Buchmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Dahmen</surname>
          </string-name>
          , E. (eds) Post-Quantum Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-
          <fpage>540</fpage>
          -88702-
          <issue>7</issue>
          _
          <fpage>3</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Biswas</surname>
            , Bhaskar, and
            <given-names>Nicolas</given-names>
          </string-name>
          <string-name>
            <surname>Sendrier</surname>
          </string-name>
          .
          <article-title>"McEliece cryptosystem implementation: Theory and practice</article-title>
          ."
          <string-name>
            <surname>Post-Quantum</surname>
            <given-names>Cryptography</given-names>
          </string-name>
          : Second International Workshop, PQCrypto 2008 Cincinnati,
          <string-name>
            <surname>OH</surname>
          </string-name>
          , USA, October
          <volume>17</volume>
          -
          <issue>19</issue>
          ,
          <year>2008</year>
          Proceedings 2. Springer Berlin Heidelberg,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Gagnidze</surname>
            , Avtandil,
            <given-names>Maksim</given-names>
          </string-name>
          <string-name>
            <surname>Iavich</surname>
            , and
            <given-names>Giorgi</given-names>
          </string-name>
          <string-name>
            <surname>Iashvili</surname>
          </string-name>
          .
          <article-title>"Novel version of merkle cryptosystem." Bulletin of the Georgian National Academy of Sciences (</article-title>
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Iavich</surname>
          </string-name>
          ,
          <string-name>
            <surname>Maksim</surname>
          </string-name>
          , et al.
          <article-title>"ADVANTAGES AND CHALLENGES OF QRNG INTEGRATION INTO MERKLE." Scientific and practical cyber security journal (</article-title>
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Lamport</surname>
            ,
            <given-names>Leslie.</given-names>
          </string-name>
          <article-title>"Constructing digital signatures from a one way function</article-title>
          .
          <source>"</source>
          (
          <year>1979</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Post-Quantum Digital Signatures with Attenuated Pulse Generator; M. Iavich</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Bocu</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Arakelian</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <article-title>Iashvili; ceur-ws</article-title>
          .
          <source>org</source>
          , Vol-
          <volume>2698</volume>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>