1,917 Hits in 4.0 sec

Improving Stateless Hash-Based Signatures [chapter]

Jean-Philippe Aumasson, Guillaume Endignoux
2018 Lecture Notes in Computer Science  
We present several optimizations to SPHINCS, a stateless hash-based signature scheme proposed by Bernstein et al. in 2015: PORS, a more secure variant of the HORS few-time signature scheme used in SPHINCS  ...  Based on a refined analysis of the subset resilience problem, we show that SPHINCS' parameters can be modified to reduce the signature size while retaining a similar security level and computation time  ...  Introduction In 2015 Bernstein et al. presented SPHINCS [5] , a stateless hash-based signature scheme combining Goldreich's [12, §6.4.2] binary authentication tree of one-time signatures (OTS) and Reyzin  ... 
doi:10.1007/978-3-319-76953-0_12 fatcat:g2u7geczxzap7omn57u6anfmgm

Hash-based signature revisited

Lingyun Li, Xianhui Lu, Kunpeng Wang
2022 Cybersecurity  
of hash-based signature into limited number and stateful schemes, unlimited number and stateful schemes and unlimited number and stateless schemes.  ...  The goal of this paper is to present, classify and discuss different solutions for hash-based signature.  ...  implementation strategies about stateful and stateless hash-based signatures.  ... 
doi:10.1186/s42400-022-00117-w fatcat:ssugdb7crnhmfhdqct55td45du

On the Role of Hash-based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions [article]

Sabah Suhail, Rasheed Hussain, Abid Khan, Choong Seon Hong
2020 arXiv   pre-print
In this paper, we investigate applications of one of the post-quantum signatures called Hash-Based Signature (HBS) schemes for the security of IoT devices in the quantum era.  ...  Currently, secure and reliable data communication in IoT is based on public-key cryptosystems such as Elliptic Curve Cryptosystem (ECC).  ...  Stateful hash-based signature schemes.  ... 
arXiv:2004.10435v1 fatcat:bx6g5lidlbatpdgd3omwfk22i4

State Management for Hash-Based Signatures [chapter]

David McGrew, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann
2016 Lecture Notes in Computer Science  
Hash-based signatures are well-understood and promising candidates, and the object of current standardization efforts.  ...  While the theory of hash-based signatures is mature, a discussion of the system security issues arising from the concrete management of their state has been lacking.  ...  There are stateless hash-based signature schemes [1, 12] that address state concerns, but their signature sizes are significantly higher.  ... 
doi:10.1007/978-3-319-49100-4_11 fatcat:qq54nyxr7naelmq2xdxhzwyica

SPHINCS-α: A Compact Stateless Hash-Based Signature Scheme [article]

Kaiyi Zhang, Hongrui Cui, Yu Yu
2022 IACR Cryptology ePrint Archive  
In this paper, we introduce SPHINCS-α, a stateless hash-based signature scheme, which benefits from a twofold improvement.  ...  Plugging the two improved components into the framework of the state-of-the-art (stateless) hash-based SPHINCS + , with carefully chosen parameter choices, yields a certain degree of performance improvement  ...  Conclusion In this paper, we improve the performance of state-of-the-art stateless hash-based signature.  ... 
dblp:journals/iacr/ZhangCY22 fatcat:sjneny7f5rau3newbiy44522i4

Address Autoconfiguration in IPv6 Networks: Challenges and Countermeasures

2019 International journal of recent technology and engineering  
The Internet Engineering Task Force (IETF) has classified autoconfiguration into Stateless and Stateful mechanisms. Several IPv6 protocols have been employed to achieve autoconfiguration of networks.  ...  Stateless Autoconfiguration Optimization One of the major challenges in autoconfiguration is to optimize and improve the performance of the existing autoconfiguration process.  ...  Signature and Timestamps options were included to block spoofing.  ... 
doi:10.35940/ijrte.d9178.118419 fatcat:mmnp7vapsbhcpivxxi3b5cyc7i

Denial-of-service resistance in key establishment

Jason Smith, Suratose Tritilanunt, Colin Boyd, Juan M. Gonzalez Nieto, Ernest Foo
2007 International Journal of Wireless and Mobile Computing  
In this work we review the strategies and techniques used to improve resistance to denial of service attacks.  ...  Figure 1 : 1 Hash-Based Puzzle Constructions =Figure 2 : 2 H (s, sa R , IP I , N I , N R , a, r ) HASH * I ?  ...  The requirements for overloading cookie functionality into a hash-based client puzzle were presented with the observation that puzzles based on the Aura et al.  ... 
doi:10.1504/ijwmc.2007.013796 fatcat:vdk3bzxyabgypajyxjb65pc6k4

New Parameter Sets for SPHINCS+

Jinwoo LEE, Tae Gu KANG, Kookrae CHO, Dae Hyun YUM
2021 IEICE transactions on information and systems  
SPHINCS + is a state-of-the-art post-quantum hash-based signature that is a candidate for the NIST post-quantum cryptography standard.  ...  For a target bit security, SPHINCS + supports many different tradeoffs between the signature size and the signing speed.  ...  SPHINCS + is a stateless hash-based signature framework rather than a specific signature scheme.  ... 
doi:10.1587/transinf.2019edl8223 fatcat:a4w2vrce5vehve2uxv3x7s247u

Practical Fault Injection Attacks on SPHINCS [article]

Aymeric Genêt, Matthias J. Kannwischer, Hervé Pelletier, Andrew McLauchlan
2018 IACR Cryptology ePrint Archive  
In particular, hash-based signature schemes appear to be the most conservative choice for post-quantum digital signatures.  ...  We perform the attack on an Arduino Due board featuring an ARM Cortex-M3 microprocessor running the original stateless scheme SPHINCS with a focus on practicality.  ...  We consider innovative ways of protecting stateless hash-based signatures as interesting future work.  ... 
dblp:journals/iacr/GenetKPM18 fatcat:lcvf4jp4wbdwbgbbe4sg42ey2a

Quantum-resistant digital signatures schemes for low-power IoT [article]

Hannes Hattenbach
2021 arXiv   pre-print
In this paper i am comparing some signature schemes currently in the process of standardization by the NIST.  ...  These will then be able to break most of the encryption and signature schemes currently in use. This is the case for human interface devices as well as for IoT nodes.  ...  Since this sparsity of alternatives we we also focus on hash and lattice based signatures in this paper. 1) Hash Based Signatures (HBS): Hash based signatures have their security based upon the hardness  ... 
arXiv:2106.11710v1 fatcat:kqkiaeodofh7pj24q2h52usgoy

K-XMSS and K-SPHINCS + : Hash based Signatures with\\Korean Cryptography Algorithms [article]

Minjoo Sim, Siwoo Eum, Gyeongju Song, Hyeokdong Kwon, Kyungbae Jang, Hyunjun Kim, HyunJi Kim, Yujin Yang, Won-Woong Kim, Wai-Kong Lee, Hwajeong Seo
2022 IACR Cryptology ePrint Archive  
Hash-Based Signature (HBS) uses a hash function to construct a digital signature scheme, where its security is guaranteed by the collision resistance of the hash function used.  ...  K-XMSS is a stateful signature, while K-SPHINCS + is its stateless counterpart.  ...  SPHINCS + SPHINCS + [11] is a stateless hash-based signature framework that improves the speed and signature size of SPHINCS [5] .  ... 
dblp:journals/iacr/SimESKJKKYKLS22 fatcat:n4hkpz3p6bb6fhg2vo53krmjdu

Security notions for stateful signature schemes

Quan Yuan, Mehdi Tibouchi, Masayuki Abe
2021 IET Information Security  
In some digital signature schemes, the signer needs to maintain a dynamic state while signing messages. These are called stateful signature schemes.  ...  Although stateful signature schemes are commonly used as cryptographic primitives, they do not fit the standard definition of a signature scheme in cryptography.  ...  We provide an example of a hash-based signature scheme. Currently, there are various efficient hash-based signature schemes, such as XMSS MT [1] and SPHINCS [2] , which have similar structures.  ... 
doi:10.1049/ise2.12040 fatcat:wp4rqyug6va35h2ehs24x5f5la

A Contribution To Secure The Routing Protocol "Greedy Perimeter Stateless Routing'' Using A Symmetric Signature-Based Aes And Md5 Hash

Mohammed ERRITALI, Oussama Mohamed Reda, Bouabid El Ouahidi
2011 International Journal of Distributed and Parallel systems  
Then, we propose a solution to secure GPSR packet by adding a digital signature based on symmetric cryptography generated using the AES algorithm and the MD5 hash function more suited to a mobile environment  ...  This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions  ...  -Application of a hash function on the GPSR packet header. (Integrity Management) -Implementation of the AES algorithm to generate the signature to be added to the package GPSR. IV.  ... 
doi:10.5121/ijdps.2011.2509 fatcat:f2a4bxdk3rcqlmlyaqnxwwnykq

Short Transitive Signatures for Directed Trees [chapter]

Philippe Camacho, Alejandro Hevia
2012 Lecture Notes in Computer Science  
Stateless transitive signatures for directed trees Ruhr Univ. Bochum, previously Univ.  ...  We also consider privacy of attributes: the signature does not leak which subset of size t of S was used to sign. • Signature of size ( ) • Better than ( log ) [Neven08], but still room for improvement  ...  Constant-size ciphertexts in threshold attribute-based encryption. In PKC'10.  ... 
doi:10.1007/978-3-642-27954-6_3 fatcat:46hlgin4rjfkvgwwtihbz53m5q

Differential Power Analysis of XMSS and SPHINCS [chapter]

Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann
2018 Lecture Notes in Computer Science  
We analyse the stateful hash-based signature schemes XMSS and XMSS MT , which are currently undergoing standardisation at IETF, as well as SPHINCS -the only practical stateless hash-based scheme.  ...  In particular, hash-based signature schemes are notable candidates for deployment. No rigorous side-channel analysis of hash-based signature schemes has been conducted so far.  ...  SPHINCS relies on XMSS MT , HORST, and a stateless way of addressing hash-based instances within the scheme.  ... 
doi:10.1007/978-3-319-89641-0_10 fatcat:2okqnkhqpze2nikcmjkpstzmny
« Previous Showing results 1 — 15 out of 1,917 results