<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-prabel-cfrg-suf-hybrid-sigs-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="SUF Hybrid Signature">Hybrid Digital Signatures with Strong Unforgeability</title>
    <seriesInfo name="Internet-Draft" value="draft-prabel-cfrg-suf-hybrid-sigs-01"/>
    <author initials="L." surname="Prabel" fullname="Lucas Prabel">
      <organization>Huawei</organization>
      <address>
        <email>lucas.prabel@huawei.com</email>
      </address>
    </author>
    <author initials="G." surname="Wang" fullname="Guilin Wang">
      <organization>Huawei</organization>
      <address>
        <email>wang.guilin@huawei.com</email>
      </address>
    </author>
    <author initials="J." surname="Janneck" fullname="Jonas Janneck">
      <organization>Ruhr University Bochum</organization>
      <address>
        <email>jonas.janneck@rub.de</email>
      </address>
    </author>
    <author initials="T." surname="Reddy" fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="01"/>
    <area>Security</area>
    <workgroup>CFRG</workgroup>
    <keyword>CFRG</keyword>
    <keyword>Migration</keyword>
    <keyword>PQC</keyword>
    <abstract>
      <?line 87?>

<t>This document proposes a generic hybrid signature construction that achieves strong unforgeability under chosen-message attacks (SUF-CMA), provided that the second component (typically the post-quantum one) is SUF-CMA secure. The proposed hybrid construction differs from the current composite hybrid approach by binding the second (post-quantum) signature to the concatenation of the message and the first (traditional) signature. This approach ensures that hybrid signatures maintain SUF-CMA security even when the first component only provides EUF-CMA security.</t>
      <t>In addition to this general hybrid construction, this document also proposes a non-black-box variant specifically tailored for schemes built from the Fiat-Shamir paradigm. This variant is SUF-CMA secure as long as only one component is SUF-CMA secure.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-prabel-cfrg-suf-hybrid-sigs/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Cryptography Forum Research Group mailing list (<eref target="mailto:cfrg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cfrg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cfrg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/lucasprabel/draft-cfrg-suf-hybrid-sigs"/>.</t>
    </note>
  </front>
  <middle>
    <?line 93?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>With the emergence of post-quantum (PQ) digital signatures, several groups (including ETSI CYBER and IETF LAMPS, TLS JOSE, SSHM) have explored hybrid constructions combining traditional and PQ algorithms. The main goal is to ensure long-term security during the transition to post-quantum cryptography, acknowledging that traditional algorithms are more mature than post-quantum ones and that the latter still raise uncertainty about their security.</t>
      <t>Current composite hybrid schemes typically provide existential unforgeability under chosen-message attacks (EUF-CMA), but do not ensure strong unforgeability. SUF-CMA extends EUF-CMA by requiring that it be computationally infeasible to produce a new valid signature even for a message-signature pair previously observed. This distinction has practical implications in preventing message replay, transaction duplication, and log poisoning.</t>
      <t>Although several recent algorithms such as EdDSA, ML-DSA, and SLH-DSA claim to achieve SUF-CMA security, some popular traditional schemes (RSA, ECDSA) only achieve EUF-CMA. Therefore, constructing a hybrid digital signature scheme maintaining SUF-CMA when one component does not is of particular interest.</t>
      <t>To address this concern, this document specifies a generic hybrid construction that guarantees SUF-CMA security when the second underlying component (e.g. the PQ scheme) is SUF-CMA. The construction is quite simple and can be applied generically across PQ/T signature combinations. It is originally proposed in <xref target="BH23"/>, though its SUF-CMA security is not analyzed in the article.The construction could also be used for a hybrid PQ/PQ security, relying on two post-quantum components.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document follows the terminology for post-quantum hybrid schemes defined in <xref target="I-D.draft-ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>This section recalls some of this terminology, but also adds other definitions used throughout the whole document:</t>
      <t><em>EUF-CMA</em>:  Existential Unforgeability under Chosen Message Attack.</t>
      <t><em>SUF-CMA</em>:  Strong Unforgeability under Chosen Message Attack.</t>
      <t><em>Post-Quantum Asymmetric Cryptographic Algorithm</em>:  An asymmetric
cryptographic algorithm that is intended to be secure against
attacks using quantum computers as well as classical computers.
They can also be called quantum-resistant or quantum-safe algorithms.</t>
      <t><em>PQ/T Hybrid Digital Signature</em>:  A multi-algorithm digital signature scheme made up of two or more component digital signature algorithms where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
      <t><em>Post-Quantum Traditional (PQ/T) Hybrid Composite Scheme</em>:  A multi-algorithm scheme where at least one component algorithm is a post-quantum algorithm and at least one is a traditional algorithm and the resulting composite scheme is exposed as a singular interface of the same type as the component algorithms.</t>
      <t><em>Component Scheme:</em>  Each cryptographic scheme that makes up a PQ/T hybrid scheme or PQ/T hybrid protocol.</t>
    </section>
    <section anchor="proposed-construction">
      <name>Proposed Construction</name>
      <t>The proposed construction ensures that the second (nested) signature binds the first (nested) signature, making the overall scheme SUF-CMA as long as the (typically PQ) component is SUF-CMA secure. The hybrid signature construction is defined in the following subsections.</t>
      <t>Before signing a message <tt>m</tt>, the hybrid scheme derives a message representative <tt>m'</tt> from <tt>m</tt> to address specific security concerns, and in particular to achieve non-separability, following a similar approach to <xref target="I-D.draft-ietf-lamps-pq-composite-sigs"/>.</t>
      <section anchor="hybrid-key-generation">
        <name>Hybrid Key Generation</name>
        <artwork><![CDATA[
Generate component keys

- Generate `(pk1, sk1)` for the traditional scheme.
- Generate `(pk2, sk2)` for the post-quantum scheme.
- The hybrid public key is `pk = (pk1 || pk2)`.
]]></artwork>
      </section>
      <section anchor="hybrid-sign">
        <name>Hybrid Sign</name>
        <t>The Hybrid.Sign algorithm consists in signing a message <tt>m'</tt> derived from <tt>m</tt> with the first component, and then signing the concatenation <tt>m' || s1</tt> of the derived message with the first signature with the second component.</t>
        <artwork><![CDATA[
Generate the message representative

- Compute m' = Prefix || Label || len(ctx) || ctx || PH(m)

Generate hybrid signature

- Compute s1 = Sign_1(sk1, m')
- Compute s2 = Sign_2(sk2, m' || s1)
- Output the hybrid signature s = (s1 || s2)
]]></artwork>
        <t>In the computation of the message representative:
- <tt>Prefix</tt> is the byte encoding of the string "SUFHybridSignature2025", which in hexadecimal is "5355464879627269645369676E617475726532303235".
- <tt>Label</tt>: a label which is specific to the particular component algorithms being used.
- <tt>len(ctx)</tt>: a single byte representing the length of <tt>ctx</tt>.
- <tt>ctx</tt>: the context bytes.
- <tt>PH(m)</tt>: the hash of the message to be signed.</t>
      </section>
      <section anchor="hybrid-verify">
        <name>Hybrid Verify</name>
        <artwork><![CDATA[
Verify hybrid signature

- Compute m' = Prefix || Label || len(ctx) || ctx || PH(m)
- Parse s as (s1, s2)
- Compute Verify_1(pk1, m', s1)
- Compute Verify_2(pk2, m' || s1, s2)
- Accept if both verifications succeed.
]]></artwork>
      </section>
      <section anchor="related-works">
        <name>Related works</name>
        <t>The hybrid construction in <xref target="I-D.draft-ietf-lamps-pq-composite-sigs"/> only provides SUF-CMA security if both components is providing SUF-CMA security and one of the components are deterministic. As traditional signatures do not provide any security against quantum attackers, when <xref target="I-D.draft-ietf-lamps-pq-composite-sigs"/> is used for
PQ/T hybrid scheme, it does not provide SUF-CMA security against quantum attackers. In this document, only the second component needs to be SUF-CMA so that the hybrid scheme achieves SUF-CMA security.</t>
        <t>In contrast to <xref target="I-D.draft-ietf-lamps-pq-composite-sigs"/>, the signing process of the hybrid construction proposed in this document cannot be parallelized. Indeed, computing the hybrid signature <tt>s = (s1 || s2)</tt> requires to compute <tt>s1 = Sign_1(sk1, m')</tt> first in order to compute <tt>s2 = Sign_2(sk2, m' || s1)</tt>.</t>
      </section>
    </section>
    <section anchor="non-black-box-construction">
      <name>Non-black-box Construction</name>
      <t>The proposed construction of this section ensures that the overall scheme is SUF-CMA as long as only one component is SUF-CMA secure. The hybrid signature construction is defined in the following subsections.</t>
      <t>The hybrid can be used for signature schemes that are built from the Fiat-Shamir paradigm as the first component and from any signature scheme as the second compoenent. Hence, they use a canonical identification scheme (ID) underlying a Fiat-Shamir construction and a signature scheme (Sig_2).
This applies to combining EdDSA and any post-quantum signature scheme, for example ML-DSA.</t>
      <t>Before signing a message <tt>m</tt>, the hybrid scheme derives a message representative <tt>m'</tt> from <tt>m</tt> to address specific security concerns, and in particular to achieve non-separability, following a similar approach to <xref target="I-D.draft-ietf-lamps-pq-composite-sigs"/>.</t>
      <section anchor="hybrid-key-generation-1">
        <name>Hybrid Key Generation</name>
        <artwork><![CDATA[
Generate component keys

- Generate `(pk1, sk1)` for the (traditional) ID scheme.
- Generate `(pk2, sk2)` for the (post-quantum) signature scheme.
- The hybrid public key is `pk = (pk1, pk2)`.
]]></artwork>
      </section>
      <section anchor="hybrid-sign-1">
        <name>Hybrid Sign</name>
        <t>The Hybrid.Sign algorithm consists of applying the Fiat-Shamir paradigm for the first signature component. During the process (after the commitment has been computed), the second component is applied by signing the message and the commitment. The remainder of the Fiat-Shamir signature is computed using the second signature component instead of the message and the commitment as usual.</t>
        <artwork><![CDATA[
Generate the message representative

- Compute m' = Prefix || Label || len(ctx) || ctx || pk's || PH(m)

Generate hybrid signature

- Compute (com, st) = ID.Com(sk1)
- Compute m'' = PH(1 || m' || com)
- Compute s2 = Sig.Sign_2(sk2, m'')
- Compute chl = PH(2 || s2)
- Compute rsp = ID.Rsp(sk1, com, chl, st)
- Output the hybrid signature s = (rsp || s2)
]]></artwork>
        <t>In the computation of the message representative:
- <tt>Prefix</tt> is the byte encoding of the string "SUFHybridSignature2025", which in hexadecimal is "5355464879627269645369676E617475726532303235".
- <tt>Label</tt>: a specific label which is specific to the particular component algorithms being used.
- <tt>len(ctx)</tt>: a single byte representing the length of <tt>ctx</tt>.
- <tt>ctx</tt>: the context bytes.
- <tt>pk's</tt>: the concatenation of pk1 and pk2.
- <tt>PH(m)</tt>: the hash of the message to be signed.</t>
      </section>
      <section anchor="hybrid-verify-1">
        <name>Hybrid Verify</name>
        <artwork><![CDATA[
Verify hybrid signature

- Compute m' = Prefix || Label || len(ctx) || ctx || pk's || PH(m)
- Parse s as (rsp || s2)
- Compute chl = PH(2 || s2)
- Compute com = ID.ExtCom(pk1, ch, rsp)
- Compute m'' = PH(1 || m' || com)
- Compute Verify_2(pk2, m'', s2)
- Accept if verification succeeds.
]]></artwork>
      </section>
      <section anchor="security-and-applicability">
        <name>Security and Applicability</name>
        <t>The hybrid is SUF-CMA if one of the underlying signatures is SUF-CMA secure. Additionally, the ID scheme must have unique responses and the second signature component (post-quantum component) must fulfill message-bound security (MBS) <xref target="BUFF"/> and random-message validity (RMV) <xref target="Jan25"/>.</t>
        <t>The first requirement (on the traditional scheme) is fulfilled by EdDSA which is built from an ID scheme with unique responses. The second requirement (on the post-quantum scheme) is fulfilled by any of NIST standards/winners, i.e. ML-DSA, SLH-DSA, Falcon (to be FN-DSA).</t>
      </section>
    </section>
    <section anchor="why-the-binding-hybrid-is-required">
      <name>Why the Binding Hybrid is Required</name>
      <t>Hybrid constructions are often intended to support requirements described in non-cryptographic terms as "single-signature semantics" or "artifact-level integrity." These terms generally refer to the operational goal where a message should be associated with one, and only one, valid signature string. In many real-world deployments, this security property is central: software releases, firmware images, signed logs, legal/financial documents, etc. In cryptography, this goal is most closely addressed by SUF-CMA security. While SUF-CMA does not mathematically guarantee uniqueness (the existence of only one valid signature per message), it provides a computational guarantee that an adversary cannot produce a different valid signature for a message that has already been signed.</t>
      <t>A binding hybrid is required because parallel hybrids fail to maintain SUF-CMA if one component (e.g., the traditional one) is only EUF-CMA or becomes forgeable. In such cases, the hybrid signature becomes malleable, allowing multiple valid signature strings for the same message, which breaks the intended "single-signature" logic of the application. A hybrid design achieves SUF-CMA only if one signature component is cryptographically bound to the other, forming a binding hybrid rather than signing the same message independently.</t>
      <t>Any successful forgery of a binding hybrid must fall into one of two categories:</t>
      <ul spacing="normal">
        <li>
          <t>New second signature on a new input:<br/>
The attacker generates a new traditional signature <tt>s1*</tt> that the legitimate signer never produced. The attacker would then need to forge a valid <tt>s2*</tt> over the concatenation <tt>m' || s1*</tt>.  Producing such an <tt>s2*</tt> is a forgery against the PQC algorithm.</t>
        </li>
        <li>
          <t>Different second-signature on an already-signed input:<br/>
The attacker reuses an existing <tt>(m', s1)</tt> but fabricates a distinct <tt>s2*</tt> for the same <tt>(m' || s1)</tt>, yielding two valid second signatures for one message.</t>
        </li>
      </ul>
      <t>Both outcomes constitute a SUF-CMA forgery against the second component: the first case for a new message, the second for a second valid signature on an existing message.  If the second component is SUF-CMA secure, neither case is computationally feasible, and the combined hybrid inherits SUF-CMA security.</t>
      <section anchor="loss-of-non-repudiation-in-parallel-hybrids-under-crqc">
        <name>Loss of Non-Repudiation in Parallel Hybrids under CRQC</name>
        <t>As described in <xref target="I-D.draft-ietf-lamps-pq-composite-sigs"/>, composite hybrids produce multiple component signatures independently over the same message.<br/>
Once a CRQC can forge the traditional component, an attacker can create an alternate classical signature <tt>s1*</tt> for a message that already has a valid hybrid signature <tt>(s1, s2)</tt>.  Because the PQC signature <tt>s2</tt> remains valid independently of the classical signature, the modified pair <tt>(s1*, s2)</tt> also verifies successfully.</t>
        <t>While authenticity of the PQC component remains intact, the hybrid scheme is no longer SUF-CMA secure: multiple distinct hybrid signatures <tt>(s1, s2)</tt> and <tt>(s1*, s2)</tt> are both valid signatures for the same message. Therefore, once the classical algorithm becomes breakable, parallel hybrids no longer provide SUF-CMA security.</t>
        <t>On the contrary, this document’s hybrid construction, by binding the second signature <tt>s2</tt> to the first signature <tt>s1</tt>, ensures single-signature semantics and preserves non-repudiation.</t>
      </section>
      <section anchor="ecdsa-vs-eddsa-in-hybrid-constructions">
        <name>ECDSA vs EdDSA in Hybrid Constructions</name>
        <t>It is important to distinguish the properties of ECDSA and EdDSA. Indeed, even though both ECDSA (secp256r1/secp384r1) and EdDSA (Ed25519/Ed448) become mathematically breakable once a CRQC can derive private keys from public keys, their behaviour differs:</t>
        <ul spacing="normal">
          <li>
            <t>ECDSA is randomized and only provides EUF-CMA security.</t>
          </li>
          <li>
            <t>EdDSA is designed to be SUF-CMA and its signing process is deterministic. In binding hybrids, EdDSA’s fixed, deterministic format enables unambiguous inclusion of <tt>s1</tt> in the PQC input <tt>(m' || s1)</tt>, simplifying verification and ensuring consistent interpretation across implementations.</t>
          </li>
        </ul>
        <t>Consequently, both algorithms lose their security properties, including SUF-CMA, once a CRQC can derive private keys. Therefore, neither algorithm can guarantee non-repudiation in a parallel hybrid construction under a quantum threat. The binding construction is therefore necessary regardless of the traditional algorithm used, as it ensures the overall SUF-CMA property is maintained by the post-quantum component.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="security-model-and-motivation">
        <name>Security Model and Motivation</name>
        <t>The hybrid construction described in this document aims to guarantee strong unforgeability of the composite signature whenever the second component is SUF-CMA secure. This is in contrast to the composite construction in <xref target="I-D.draft-ietf-lamps-pq-composite-sigs"/>, where SUF-CMA of the composite generally requires both components to be SUF-CMA. The design proposed here strengthens that property: SUF-CMA of the overall construction depends only on the SUF-CMA of the second component, regardless of the security level of the first one.</t>
      </section>
      <section anchor="suf-cma-security">
        <name>SUF-CMA Security</name>
        <section anchor="why-suf-cma-matters">
          <name>Why SUF-CMA matters</name>
          <t>While EUF-CMA security could be sufficient in several use cases, weaknesses in EUF-only schemes allow "re-signing" the same message, enabling real-world exploits such as replay of messages, double receipts, and log poisoning. Moreover, many current deployed systems implicitly assume that all digital signatures are SUF-CMA secure.</t>
          <t>For this reason, the construction ensures that if the second component is SUF-CMA, the hybrid automatically resists replay and duplication attacks, aligning with best practices in recent signature standards (EdDSA, ML-DSA, SLH-DSA, etc.).</t>
        </section>
        <section anchor="security-rationale">
          <name>Security Rationale</name>
          <t>Intuitively, an adversary attempting to forge <tt>(m*, s1*, s2*)</tt> must either:</t>
          <ul spacing="normal">
            <li>
              <t>Forge <tt>s2*</tt> on <tt>(m* || s1*)</tt>, which is infeasible if the second scheme is SUF-CMA;</t>
            </li>
          </ul>
          <t>or</t>
          <ul spacing="normal">
            <li>
              <t>Reuse an existing <tt>(m, s1)</tt> pair with a modified <tt>s2</tt>, which again breaks SUF-CMA of the second scheme.</t>
            </li>
          </ul>
          <t>Consequently, if the second component is SUF-CMA secure, the hybrid construction remains SUF-CMA secure even when the first component provides only EUF-CMA security.</t>
          <t>In contrast, if the second scheme were only EUF-CMA, the second attack (re-signing the same message differently) would no longer be excluded, and the hybrid construction would not be SUF-CMA secure.</t>
          <t>This contrasts with classical composite hybrids (e.g. <tt>trad(M) || PQ(M)</tt>)
where the PQ signature does not authenticate the output of the
traditional signature, leaving possible avenues for replay or
signature substitution.</t>
        </section>
      </section>
      <section anchor="non-separability">
        <name>Non-Separability</name>
        <t>The document <xref target="I-D.draft-ietf-pquip-hybrid-signature-spectrums"/> defines both notions of Weak Non-Separability (WNS) and Strong Non-Separability (SNS).</t>
        <t>The hybrid construction in this document achieves WNS because the <tt>Prefix</tt> of the message representative <tt>m'</tt> is an evidence that a verifier may be able to identify, preventing the validation of a component signature which would have been removed from the composite signature.</t>
        <t>However, SNS is not achieved, as <tt>s1</tt> stripped from a composite signature <tt>s = (s1 || s2)</tt> is a valid component signature of the message <tt>m'</tt> and <tt>s2 </tt> is a valid component signature of the message <tt>m' || s1</tt>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.draft-ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="I-D.draft-ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="24" month="February" year="2026"/>
            <abstract>
              <t>   This document defines combinations of US NIST ML-DSA in hybrid with
   traditional algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet regulatory
   guidelines.  Composite ML-DSA is applicable in applications that uses
   X.509 or PKIX data structures that accept ML-DSA, but where the
   operator wants extra protection against breaks or catastrophic bugs
   in ML-DSA, and where EUF-CMA-level security is acceptable.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-15"/>
        </reference>
        <reference anchor="I-D.draft-ietf-pquip-hybrid-signature-spectrums">
          <front>
            <title>Hybrid signature spectrums</title>
            <author fullname="Nina Bindel" initials="N." surname="Bindel">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="20" month="June" year="2025"/>
            <abstract>
              <t>   This document describes classification of design goals and security
   considerations for hybrid digital signature schemes, including proof
   composability, non-separability of the component signatures given a
   hybrid signature, backwards/forwards compatibility, hybrid
   generality, and simultaneous verification.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-07"/>
        </reference>
        <reference anchor="BH23" target="https://eprint.iacr.org/2023/423.pdf">
          <front>
            <title>A Note on Hybrid Signature Schemes</title>
            <author initials="N." surname="Bindel" fullname="Nina Bindel">
              <organization/>
            </author>
            <author initials="B." surname="Hale" fullname="Britta Hale">
              <organization/>
            </author>
            <date year="2023" month="July"/>
          </front>
        </reference>
        <reference anchor="Jan25" target="https://eprint.iacr.org/2025/1844.pdf">
          <front>
            <title>Bird of Prey: Practical Signature Combiners Preserving Strong Unforgeability</title>
            <author initials="J." surname="Janneck" fullname="Jonas Janneck">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="BUFF" target="https://ieeexplore.ieee.org/document/9519420">
          <front>
            <title>BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures</title>
            <author initials="C." surname="Cremers" fullname="Cas Cremers">
              <organization/>
            </author>
            <author initials="S." surname="Düzlü" fullname="Samed Düzlü">
              <organization/>
            </author>
            <author initials="R." surname="Fiedler" fullname="Rune Fiedler">
              <organization/>
            </author>
            <author initials="M." surname="Fischlin" fullname="Marc Fischlin">
              <organization/>
            </author>
            <author initials="C." surname="Janson" fullname="Christian Janson">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
