Abstract. We show how to extend hash-tree based data signatures to server-assisted personal digital signature schemes. The new signature scheme does not use trapdoor functions and is based solely on cryptographic hash functions and is thereby, considering the current state of knowledge, resistant to quantum computational attacks. In the new scheme, we combine hash-tree data signature (time-stamping) solutions with hash sequence authentication mechanisms. We show how to implement such a scheme in practice.
Abstract. This paper introduces a high-security post-quantum stateless hash-based sig-nature scheme ...
A new post-quantum, hash-based signature (HBS) scheme is introduced. In known HBS, the size and cost...
One-time signature schemes rely on hash functions and are, therefore, assumed to be resistant to att...
Digital signatures are ubiquitous in modern security infrastructures. Their lack of diversity in ind...
The use of public key cryptosystems range from securely encrypting emails and files to creating digi...
This paper introduces a high-security post-quantum stateless hash-based signature scheme that signs ...
This paper introduces a high-security post-quantum stateless hash-based signature scheme that signs ...
The potential advent of quantum computers in coming years has motivated security researchers to star...
Public-key cryptography is a key technology for making the Internet and other IT infrastructures sec...
© 2016, Pleiades Publishing, Ltd.In the paper we define a notion of quantum resistant ((δ, є)-resist...
We present a version of quantum hash functions based on non-binary discrete functions. The proposed ...
This work introduces XMSS-T, a new stateful hash-based signature scheme with tight security. Previou...
Abstract. This paper introduces a high-security post-quantum stateless hash-based sig-nature scheme ...
A new post-quantum, hash-based signature (HBS) scheme is introduced. In known HBS, the size and cost...
One-time signature schemes rely on hash functions and are, therefore, assumed to be resistant to att...
Digital signatures are ubiquitous in modern security infrastructures. Their lack of diversity in ind...
The use of public key cryptosystems range from securely encrypting emails and files to creating digi...
This paper introduces a high-security post-quantum stateless hash-based signature scheme that signs ...
This paper introduces a high-security post-quantum stateless hash-based signature scheme that signs ...
The potential advent of quantum computers in coming years has motivated security researchers to star...
Public-key cryptography is a key technology for making the Internet and other IT infrastructures sec...
© 2016, Pleiades Publishing, Ltd.In the paper we define a notion of quantum resistant ((δ, є)-resist...
We present a version of quantum hash functions based on non-binary discrete functions. The proposed ...
This work introduces XMSS-T, a new stateful hash-based signature scheme with tight security. Previou...
Abstract. This paper introduces a high-security post-quantum stateless hash-based sig-nature scheme ...
A new post-quantum, hash-based signature (HBS) scheme is introduced. In known HBS, the size and cost...
One-time signature schemes rely on hash functions and are, therefore, assumed to be resistant to att...