We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 816 results
  1. Hash-based signature revisited

    The current development toward quantum attack has shocked our confidence on classical digital signature schemes. As one of the mainstreams of post...

    Lingyun Li, **anhui Lu, Kunpeng Wang in Cybersecurity
    Article Open access 01 July 2022
  2. Patent Landscape in the field of Hash-Based Post-Quantum Signatures

    Post-Quantum Cryptography (PQC) is one of the most fascinating topics of recent developments in cryptography. Following the ongoing standardization...
    Megha Agrawal, Kumar Duraisamy, ... Vishal Saraswat in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  3. Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme

    In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial...

    Purvi Tandel, Jitendra Nasriwala in Service Oriented Computing and Applications
    Article 14 June 2024
  4. Quantum-Access Security of Hash-Based Signature Schemes

    In post-quantum cryptography, hash-based signature schemes are attractive choices because of the weak assumptions. Most existing hash-based signature...
    Quan Yuan, Mehdi Tibouchi, Masayuki Abe in Information Security and Privacy
    Conference paper 2023
  5. Faulting Winternitz One-Time Signatures to Forge LMS, XMSS, or  \(\text {SPHINCS}^{+}\) Signatures

    Hash-based signature (HBS) schemes are an efficient method of guaranteeing the authenticity of data in a post-quantum world. The stateful schemes LMS...
    Alexander Wagner, Vera Wesselkamp, ... Emanuele Strieder in Post-Quantum Cryptography
    Conference paper 2023
  6. Hash-Based Direct Anonymous Attestation

    Direct Anonymous Attestation (DAA) was designed for the Trusted Platform Module (TPM) and versions using RSA and elliptic curve cryptography have...
    Liqun Chen, Changyu Dong, ... Yalan Wang in Post-Quantum Cryptography
    Conference paper 2023
  7. Batch Signatures, Revisited

    We revisit batch signatures (previously considered in a draft RFC and used in multiple recent works), where a single, potentially expensive, “inner”...
    Carlos Aguilar-Melchor, Martin R. Albrecht, ... Marc Manzano in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
  8. Review and analysis of classical algorithms and hash-based post-quantum algorithm

    Over the years, digital signature algorithms such as Rivest–Shamir–Adleman (RSA) and elliptic curve digital signature algorithm (ECDSA) are the...

    Moses Dogonyaro Noel, Victor Onomza Waziri, ... Joseph Adebayo Ojeniyi in Journal of Reliable Intelligent Environments
    Article 15 October 2021
  9. Subversion-Resilient Signatures Without Random Oracles

    In the aftermath of the Snowden revelations in 2013, concerns about the integrity and security of cryptographic systems have grown significantly. As...
    Pascal Bemmann, Sebastian Berndt, Rongmao Chen in Applied Cryptography and Network Security
    Conference paper 2024
  10. An Intermediate Secret-Guessing Attack on Hash-Based Signatures

    Digital signature schemes form the basis of trust in Internet communication. Shor (FOCS 1994) proposed quantum algorithms that can be used by a...
    Roland Booth, Yanhong Xu, ... Reihaneh Safavi-Naini in Advances in Information and Computer Security
    Conference paper 2021
  11. Post-quantum Hash-Based Signatures for Secure Boot

    The potential development of large-scale quantum computers is raising concerns among IT and security research professionals due to their ability to...
    Panos Kampanakis, Peter Panburana, ... Chirag Shroff in Silicon Valley Cybersecurity Conference
    Conference paper 2021
  12. A scalable post-quantum hash-based group signature

    We present a construction for hash-based one-time group signature schemes, and develop a traceable post-quantum multi-time group signature upon it. A...

    Masoumeh Shafieinejad, Navid Nasr Esfahani in Designs, Codes and Cryptography
    Article 24 March 2021
  13. Evaluating Hash-Based Post-Quantum Signature in Smart IoT Devices for Authentication

    The Quantum computing era has changed the idea of solving hard problems efficiently through its working mechanisms and algorithms. After the...
    Purvi H. Tandel, Jitendra V. Nasriwala in Evolutionary Computing and Mobile Sustainable Networks
    Conference paper 2022
  14. Compact Stateful Deterministic Wallet from Isogeny-Based Signature Featuring Uniquely Rerandomizable Public Keys

    Deterministic wallets are promising cryptographic primitives that are employed in cryptocurrencies to safeguard user’s fund. In CCS’19, a generic...
    Surbhi Shaw, Ratna Dutta in Cryptology and Network Security
    Conference paper 2023
  15. Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions

    Threshold signatures improve both availability and security of digital signatures by splitting the signing key into N shares handed out to different...
    Rafael del Pino, Shuichi Katsumata, ... Markku-Juhani Saarinen in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  16. Functional signatures: new definition and constructions

    Functional signatures (FS) enable a master authority to delegate its signing privilege to an assistant. Concretely, the master authority uses its...

    Qingwen Guo, Qiong Huang, ... Willy Susilo in Science China Information Sciences
    Article 27 October 2021
  17. Efficient Hash-Based Redactable Signature for Smart Grid Applications

    The sharing of energy usage data in smart grids is becoming increasingly popular because it not only allows different entities to access fine-grained...
    Fei Zhu, Xun Yi, ... **nyi Huang in Computer Security – ESORICS 2022
    Conference paper 2022
  18. Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives

    Ring signatures and ID-based cryptography are considered promising in terms of application. A ring signature authenticates messages while the author...
    Maxime Buser, Joseph K. Liu, ... Amin Sakzad in Applied Cryptography and Network Security
    Conference paper 2022
  19. Practical algorithm substitution attack on extractable signatures

    An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by subverting the original implementation. An ASA...

    Yi Zhao, Kaitai Liang, ... Emmanouil Panaousis in Designs, Codes and Cryptography
    Article 05 March 2022
  20. Post-quantum Secure Stateful Deterministic Wallet from Code-Based Signature Featuring Uniquely Rerandomized Keys

    The deterministic wallet is a promising cryptographic primitive used in cryptocurrencies to protect users’ wealth where a key derivation process...
    Conference paper 2023
Did you find what you were looking for? Share feedback.