A new post-quantum, hash-based signature (HBS) scheme is introduced. In known HBS, the size and cost of each signature increase as the total number of messages one wishes to authenticate increase. In real-world applications, requiring large volumes of signatures, they can become impractical. This paper studies HBS in a blockchain: a public, decentralized database. The proposed HBS scheme shows that, when all signatures are known, quite the opposite is possible: the signatures can become more efficient as the number of signatures grows. Authenticating large volumes of messages results less costly on average than authenticating only a few
The future of the hash based digital signature schemes appears to be very bright in the upcoming qua...
We study digital signatures with revocation capabilities and show two results. First, we define and ...
The unavoidable transition to post-quantum cryptography requires dependable quantum-safe digital sig...
Inspired by the blockchain architecture and existing Merkle tree based signature schemes, we propose...
Digital signatures are ubiquitous in modern security infrastructures. Their lack of diversity in ind...
The upcoming quantum era is believed to be an end for the elliptic curve digital signature algorithm...
Due to the need to maintain confidentiality, redundancy, and openness, the usage of Blockchain and o...
In this thesis, we introduce the basics of blockchain systems, cryptosystems, and post-quantum crypt...
Signatures are primarily used as a mark of authenticity, to demonstrate that the sender of a message...
The potential development of large-scale quantum computers is raising concerns among IT and security...
Digital signatures constructed solely from hash functions offer competitive signature sizes and fast...
The use of public key cryptosystems range from securely encrypting emails and files to creating digi...
Cryptography promises four information security objectives, namely, confidentiality, integrity, auth...
Cryptographers and security experts around the world have been awakened to the reality that one day ...
In this paper, we construct an anonymous and decentralized cryptocash protocol which is secure in th...
The future of the hash based digital signature schemes appears to be very bright in the upcoming qua...
We study digital signatures with revocation capabilities and show two results. First, we define and ...
The unavoidable transition to post-quantum cryptography requires dependable quantum-safe digital sig...
Inspired by the blockchain architecture and existing Merkle tree based signature schemes, we propose...
Digital signatures are ubiquitous in modern security infrastructures. Their lack of diversity in ind...
The upcoming quantum era is believed to be an end for the elliptic curve digital signature algorithm...
Due to the need to maintain confidentiality, redundancy, and openness, the usage of Blockchain and o...
In this thesis, we introduce the basics of blockchain systems, cryptosystems, and post-quantum crypt...
Signatures are primarily used as a mark of authenticity, to demonstrate that the sender of a message...
The potential development of large-scale quantum computers is raising concerns among IT and security...
Digital signatures constructed solely from hash functions offer competitive signature sizes and fast...
The use of public key cryptosystems range from securely encrypting emails and files to creating digi...
Cryptography promises four information security objectives, namely, confidentiality, integrity, auth...
Cryptographers and security experts around the world have been awakened to the reality that one day ...
In this paper, we construct an anonymous and decentralized cryptocash protocol which is secure in th...
The future of the hash based digital signature schemes appears to be very bright in the upcoming qua...
We study digital signatures with revocation capabilities and show two results. First, we define and ...
The unavoidable transition to post-quantum cryptography requires dependable quantum-safe digital sig...