Search
Search Results
-
Hash-based signature revisited
The current development toward quantum attack has shocked our confidence on classical digital signature schemes. As one of the mainstreams of post...
-
Patent Landscape in the field of Hash-Based Post-Quantum Signatures
Post-Quantum Cryptography (PQC) is one of the most fascinating topics of recent developments in cryptography. Following the ongoing standardization... -
Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme
In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial...
-
Quantum-Access Security of Hash-Based Signature Schemes
In post-quantum cryptography, hash-based signature schemes are attractive choices because of the weak assumptions. Most existing hash-based signature... -
Faulting Winternitz One-Time Signatures to Forge LMS, XMSS, or \(\text {SPHINCS}^{+}\) Signatures
Hash-based signature (HBS) schemes are an efficient method of guaranteeing the authenticity of data in a post-quantum world. The stateful schemes LMS... -
Hash-Based Direct Anonymous Attestation
Direct Anonymous Attestation (DAA) was designed for the Trusted Platform Module (TPM) and versions using RSA and elliptic curve cryptography have... -
Batch Signatures, Revisited
We revisit batch signatures (previously considered in a draft RFC and used in multiple recent works), where a single, potentially expensive, “inner”... -
Review and analysis of classical algorithms and hash-based post-quantum algorithm
Over the years, digital signature algorithms such as Rivest–Shamir–Adleman (RSA) and elliptic curve digital signature algorithm (ECDSA) are the...
-
Subversion-Resilient Signatures Without Random Oracles
In the aftermath of the Snowden revelations in 2013, concerns about the integrity and security of cryptographic systems have grown significantly. As... -
An Intermediate Secret-Guessing Attack on Hash-Based Signatures
Digital signature schemes form the basis of trust in Internet communication. Shor (FOCS 1994) proposed quantum algorithms that can be used by a... -
Post-quantum Hash-Based Signatures for Secure Boot
The potential development of large-scale quantum computers is raising concerns among IT and security research professionals due to their ability to... -
A scalable post-quantum hash-based group signature
We present a construction for hash-based one-time group signature schemes, and develop a traceable post-quantum multi-time group signature upon it. A...
-
Evaluating Hash-Based Post-Quantum Signature in Smart IoT Devices for Authentication
The Quantum computing era has changed the idea of solving hard problems efficiently through its working mechanisms and algorithms. After the... -
Compact Stateful Deterministic Wallet from Isogeny-Based Signature Featuring Uniquely Rerandomizable Public Keys
Deterministic wallets are promising cryptographic primitives that are employed in cryptocurrencies to safeguard user’s fund. In CCS’19, a generic... -
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions
Threshold signatures improve both availability and security of digital signatures by splitting the signing key into N shares handed out to different... -
Functional signatures: new definition and constructions
Functional signatures (FS) enable a master authority to delegate its signing privilege to an assistant. Concretely, the master authority uses its...
-
Efficient Hash-Based Redactable Signature for Smart Grid Applications
The sharing of energy usage data in smart grids is becoming increasingly popular because it not only allows different entities to access fine-grained... -
Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives
Ring signatures and ID-based cryptography are considered promising in terms of application. A ring signature authenticates messages while the author... -
Practical algorithm substitution attack on extractable signatures
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by subverting the original implementation. An ASA...
-
Post-quantum Secure Stateful Deterministic Wallet from Code-Based Signature Featuring Uniquely Rerandomized Keys
The deterministic wallet is a promising cryptographic primitive used in cryptocurrencies to protect users’ wealth where a key derivation process...