How to construct optimal one-time signatures

被引:15
|
作者
Bicakci, K [1 ]
Tsudik, G
Tung, B
机构
[1] Middle E Tech Univ, Inst Informat, TR-06531 Ankara, Turkey
[2] Univ Calif Irvine, Dept Comp Sci, Irvine, CA 92612 USA
[3] Univ So Calif, Inst Informat Sci, Marina Del Rey, CA 90292 USA
来源
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING | 2003年 / 43卷 / 03期
关键词
one-time signature; digital signature; on-line/off-line digital signature; hash function; combinatorics;
D O I
10.1016/S1389-1286(03)00285-8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One-time signature (OTS) offer a viable alternative to public key-based digital signatures. OTS security is typically based only on the strength of the underlying one-way function and does not depend on the conjectured difficulty of some mathematical problem. Although many OTS methods have been proposed in the past, no solid foundation exists for judging their efficiency or optimality. This paper develops a methodology for evaluating OTS methods and presents optimal OTS techniques for a single OTS or a tree with many OTS's. These techniques can be used in a seesaw mode to obtain the desired tradeoff between various parameters such as the cost of signature generation and its subsequent verification. (C) 2003 Elsevier B.V. All rights reserved.
引用
收藏
页码:339 / 349
页数:11
相关论文
共 49 条
  • [21] Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups
    Pan, Ping
    Wang, Licheng
    Yang, Yixian
    Gan, Yuanju
    Wang, Lihua
    Xu, Chengqian
    FUNDAMENTA INFORMATICAE, 2013, 126 (01) : 103 - 119
  • [22] How to construct universal one-way hash functions of order r
    Hong, D
    Sung, J
    Hong, S
    Lee, S
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 63 - 76
  • [23] A Fingerprint-based User Authentication Protocol with One-time Password for Wireless Sensor Networks
    Liu, Xin
    Shen, Yongjun
    Li, Shuxian
    Chen, Fenglan
    2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 9 - 12
  • [24] RESEARCH ON E-COMMERCE IDENTITY AUTHENTICATION SYSTEM BASED ON IMPROVED ONE-TIME PASSWORD
    Wang Chang Quan
    3RD INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE (IEEC 2011), PROCEEDINGS, 2011, : 123 - 126
  • [25] Hybrid Cryptography with a One-Time Stamp to Secure Contact Tracing for COVID-19 Infection
    El-Douh, Ahmed Abdel-Rahim
    Lu, Song Feng
    Elkouny, Abdelatif A.
    Amein, A. S.
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2022, 32 (01) : 139 - 146
  • [26] Improved mechanism of one-time keys for post-quantum period based on the hashing functions
    Gorbenko Yu.I.
    Isirova K.V.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2018, 77 (14): : 1277 - 1296
  • [27] Stolen-verifier attack on an efficient smartcard-based one-time password authentication scheme
    Ku, WC
    Tsai, HC
    Tsaur, MJ
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (08) : 2374 - 2376
  • [28] Constructing a One-time and a Few-time Digital Signature Schemes from the Hardness of Megrelishvili Vector-Matrix Problem
    Arzaki, Muhammad
    2019 7TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2019, : 488 - 495
  • [29] A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level
    Wang, Xingyuan
    Wang, Yu
    Zhu, Xiaoqiang
    Luo, Chao
    OPTICS AND LASERS IN ENGINEERING, 2020, 125
  • [30] Triple-image encryption scheme based on one-time key stream generated by chaos and plain images
    Liu, Hongjun
    Wang, Xingyuan
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (03) : 826 - 834