{"id":482328,"date":"2018-04-30T12:37:04","date_gmt":"2018-04-30T19:37:04","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-project&p=482328"},"modified":"2019-07-29T13:20:21","modified_gmt":"2019-07-29T20:20:21","slug":"qtesla","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/qtesla\/","title":{"rendered":"qTESLA"},"content":{"rendered":"

qTESLA is a collaboration between researchers and engineers at ISARA Corporation, Microsoft Research, Ondokuz Mayis University, Technische Universit\u00e4t Darmstadt, University S\u00e3oPaulo and the University of Washington, Tacoma.<\/p>\n

qTESLA is a family of efficient post-quantum digital signature schemes, with security based upon the hardness of the decisional Ring Learning With Errors (R-LWE) problem, which in turn relates to hard problems in lattices. qTESLA is the result of a long line of research, beginning with a signature scheme proposed by Bai and Galbraith in 2014, which is based on the Fiat-Shamir construction of Lyubashevsky (2012). This construction was used as the basis for an LWE-based instantiation called TESLA (2017) which then was modified and adapted to the setting of the decisional Ring Learning With Error problem, and finally led to the design of the signature scheme qTESLA.<\/p>\n

More information on the design of qTESLA can be found on the qTESLA website (opens in new tab)<\/span><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

qTESLA is a collaboration between researchers and engineers at ISARA Corporation, Microsoft Research, Ondokuz Mayis University, Technische Universit\u00e4t Darmstadt, University S\u00e3oPaulo and the University of Washington, Tacoma. qTESLA is a family of efficient post-quantum digital signature schemes, with security based upon the hardness of the decisional Ring Learning With Errors (R-LWE) problem, which in turn […]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[243138,13558],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-482328","msr-project","type-msr-project","status-publish","hentry","msr-research-area-quantum","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"","related-publications":[],"related-downloads":[],"related-videos":[],"related-groups":[],"related-events":[],"related-opportunities":[],"related-posts":[],"related-articles":[],"tab-content":[],"slides":[],"related-researchers":[{"type":"guest","display_name":"Sedat Akleylek","user_id":483591,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Erdem Alkim","user_id":480534,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Paulo S. L. M. Barreto","user_id":483588,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Nina Bindel","user_id":483579,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Johannes Buchmann","user_id":483567,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Edward Eaton","user_id":483528,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Gus Gutoski","user_id":483537,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Juliane Kr\u00e4mer","user_id":483573,"people_section":"Section name 1","alias":""},{"type":"user_nicename","display_name":"Patrick Longa","user_id":33271,"people_section":"Section name 1","alias":"plonga"},{"type":"guest","display_name":"Harun Polat","user_id":483552,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Jefferson E. Ricardini","user_id":483561,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Gustavo Zanon","user_id":483540,"people_section":"Section name 1","alias":""}],"msr_research_lab":[],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/482328"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":7,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/482328\/revisions"}],"predecessor-version":[{"id":600405,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/482328\/revisions\/600405"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=482328"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=482328"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=482328"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=482328"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=482328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}