How to construct optimal one-time signatures

被引:15
|
作者
Bicakci, K [1 ]
Tsudik, G
Tung, B
机构
[1] Middle E Tech Univ, Inst Informat, TR-06531 Ankara, Turkey
[2] Univ Calif Irvine, Dept Comp Sci, Irvine, CA 92612 USA
[3] Univ So Calif, Inst Informat Sci, Marina Del Rey, CA 90292 USA
来源
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING | 2003年 / 43卷 / 03期
关键词
one-time signature; digital signature; on-line/off-line digital signature; hash function; combinatorics;
D O I
10.1016/S1389-1286(03)00285-8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One-time signature (OTS) offer a viable alternative to public key-based digital signatures. OTS security is typically based only on the strength of the underlying one-way function and does not depend on the conjectured difficulty of some mathematical problem. Although many OTS methods have been proposed in the past, no solid foundation exists for judging their efficiency or optimality. This paper develops a methodology for evaluating OTS methods and presents optimal OTS techniques for a single OTS or a tree with many OTS's. These techniques can be used in a seesaw mode to obtain the desired tradeoff between various parameters such as the cost of signature generation and its subsequent verification. (C) 2003 Elsevier B.V. All rights reserved.
引用
收藏
页码:339 / 349
页数:11
相关论文
共 49 条
  • [1] One-time proxy signatures revisited
    Bicakci, Kemal
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (04) : 499 - 505
  • [2] Proxy and threshold one-time signatures
    Al-Ibrahim, M
    Cerny, A
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 123 - 136
  • [3] Review of One-Time Signatures for Multicast Authentication in Smart Grid
    Ji, Cheongmin
    Kim, Jimin
    Lee, Jae-Young
    Hong, Manpyo
    2015 12TH INTERNATIONAL CONFERENCE & EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2015,
  • [4] Monitoring Key Pair Usage through Distributed Ledgers and One-Time Signatures
    Mayr, Lucas
    Palma, Lucas
    Zambonin, Gustavo
    Silvano, Wellington
    Custodio, Ricardo
    INFORMATION, 2023, 14 (10)
  • [5] A one-time signature using run-length encoding
    Steinwandt, Rainer
    Villanyi, Viktoria I.
    INFORMATION PROCESSING LETTERS, 2008, 108 (04) : 179 - 185
  • [6] Lightweight One-Time Signature for Short Messages
    Yum, Dae Hyun
    Lee, Pil Joong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (07) : 1567 - 1575
  • [7] Improving Lamport one-time signature scheme
    Chang, MH
    Yeh, YS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (01) : 118 - 124
  • [8] Universally composable one-time signature and broadcast authentication
    MOON SangJae
    Science China(Information Sciences), 2010, 53 (03) : 567 - 580
  • [9] New One-Time Proxy Signature Scheme based on DLP using the Warrant
    Kim, Young-Seol
    Chang, Jik Hyun
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (02): : 215 - 220
  • [10] Efficient one-time signature schemes for stream authentication
    Park, Yongsu
    Cho, Yookun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2006, 22 (03) : 611 - 624