Hash-based signature revisited

نویسندگان

چکیده

Abstract The current development toward quantum attack has shocked our confidence on classical digital signature schemes. As one of the mainstreams post cryptography primitives, hash-based attracted more and concern in both cryptographic research application recent years. goal this paper is to present, classify discuss different solutions for signature. Firstly, discusses progress component signature, i.e., one-time few-time signature; then classifies tree-based public key authentication schemes into limited number stateful schemes, unlimited stateless above discussion aims analyze overall design idea categories signatures, as well construction, security reduction performance efficiency specific Finally, perspectives possible directions are briefly discussed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

High Performance of Hash-based Signature Schemes

Hash-based signature schemes, whose security is based on properties of the underlying hash functions, are promising candidates to be quantum-safe digital signatures schemes. In this work, we present a software implementation of two recent standard proposals for hash-based signature schemes, Leighton and Micali Signature (LMS) scheme and Extended Merkle Signature Scheme (XMSS), using a set of AV...

متن کامل

Biometric Identity Based Signature Revisited

In this paper, we describe a new biometric Identity Based Signature (IBS) scheme based on the Sakai Kasahara Key Construction and prove its security in the framework of a stronger security model compared to exisiting adversarial models. Besides, we present a new type of a denial of service (DoS) attack and evaluate existing biometric IBS schemes in this context. Based on the recently defined pr...

متن کامل

Leftover Hash Lemma, Revisited

The famous Leftover Hash Lemma (LHL) states that (almost) universal hash functions are good randomness extractors. Despite its numerous applications, LHL-based extractors suffer from the following two limitations: – Large Entropy Loss: to extract v bits from distribution X of minentropy m which are ε-close to uniform, one must set v ≤ m − 2 log (1/ε), meaning that the entropy loss L def = m − v...

متن کامل

Galindo-Garcia Identity-Based Signature Revisited

In Africacrypt 2009, Galindo-Garcia [11] proposed a lightweight identity-based signature (IBS) scheme based on the Schnorr signature. The construction is simple and claimed to be the most efficient IBS till date. The security is based on the discrete-log assumption and the security argument consists of two reductions: B1 and B2, both of which use the multiple-forking lemma [4] to solve the disc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cybersecurity

سال: 2022

ISSN: ['2523-3246']

DOI: https://doi.org/10.1186/s42400-022-00117-w