Filters








66 Hits in 2.5 sec

Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model [chapter]

Edward Eaton
2017 Lecture Notes in Computer Science  
This means that hash-based signatures are strong candidates for standard use in a post-quantum world.  ...  The Leighton-Micali signature scheme (LMS) is one such scheme being considered for standardization. However all systematic analyses of LMS have only considered a classical adversary.  ...  The quantum security of other hash-based constructions, such as Merkle trees and XMSS (another proposed hash-based standard) has been considered before in works such as [4, 9] .  ... 
doi:10.1007/978-3-319-72565-9_13 fatcat:qldhpv42frchdiuyntpgekwu5i

Avaliação de Algoritmos de Assinatura Baseada em Hash para Aplicação em Internet das Coisas

Pietro Di C. Gregorio, Denise Goya
2019 Zenodo  
Os esquemas de assinatura digital baseados em funções hash (HBS) são uma possível alternativa dentre os esquemas resilientes à computação quântica, por oferecerem um bom nível de segurança a um custo não  ...  Leighton-Micali Signature (LMS).  ...  O esquema Leighton-Micali Signature (LMS) pode assinar um número grande e fixo de mensagens. Utilizam-se dois componentes, uma OTS e uma func ¸ão hash.  ... 
doi:10.5281/zenodo.5726689 fatcat:bfhdj6z54ff45jdk5jcturhf34

Toward securing untrusted storage without public-key operations

Dalit Naor, Amir Shenhav, Avishai Wool
2005 Proceedings of the 2005 ACM workshop on Storage security and survivability - StorageSS '05  
Our design is based on the pre-key distribution schemes of Leighton-Micali or Blom for key distribution, and on MACs or one-time signatures for data integrity and reader/writer distinction.  ...  For key distribution problem, we suggest the methods of Leighton-Micali and Blom.  ... 
doi:10.1145/1103780.1103788 dblp:conf/storagess/NaorSW05 fatcat:dxfef423ybgltjyzy4r7cidnmq

Analysis of a Proposed Hash-Based Signature Standard [chapter]

Jonathan Katz
2016 Lecture Notes in Computer Science  
We analyze a signature scheme described in a recent Internet Draft, and highlight a variant (based on prior work of Micali and Leighton) that offers improved concrete security.  ...  Overview McGrew [5] recently proposed a standard for hash-based digital signatures.  ...  Suggested Improvements As observed by Leighton and Micali [4] , it is possible to achieve k-bit security with reduced hash lengths by modifying the LDWM scheme.  ... 
doi:10.1007/978-3-319-49100-4_12 fatcat:hj2onp4oqzfx7jujol7i2hr6au

On the scalability of an efficient "Nonscalable" key distribution scheme

Mahalingam Ramkumar
2008 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks  
We propose a novel key distribution scheme based on an elegant scheme proposed by Leighton and Micali [1].  ...  Proposed Scheme In [1] Leighton and Micali proposed an alternative to Kerberos in which the KDC chooses a master key K and a hash function h().  ...  Thus the modified LM scheme is an ID-based scheme. Modified Leighton Micali Scheme The assumed network model is as follows.  ... 
doi:10.1109/wowmom.2008.4594923 dblp:conf/wowmom/Ramkumar08 fatcat:f4l63b632fasngjddkjpnufnnq

Applications of smartcards for anonymous and verifiable databases

Thomas Hardjono, Jennifer Seberry
1995 Computers & security  
In this paper we describe a practical solution towards anonymous and verifiable databases based on the use of smartcards and the recent Improved Leighton-Micali protocol for the distribution of keys.  ...  on the use of smartcards and the recent Improved Leighton-Micali protocol for the distribution of keys.  ...  Towards a practical scheme In this section we present a practical scheme for anonymous and verifiable databases based on the Improved Leighton-Micali (ILM) protocol [3] .  ... 
doi:10.1016/0167-4048(95)00011-v fatcat:h5xjbo5svrfcvhfpjpqx2gjwhy

Text/Conference Paper

Stefan-Lukas Gazdag, Markus Friedl, Daniel Loebenberger
2019 Jahrestagung der Gesellschaft für Informatik  
In this paper we detail the troubles we encountered when using hash-based signatures in practice and study the most important use case for hash-based signatures: software or code signing.  ...  Hash-based signatures are a very promising candidate since they have been analyzed and improved for years.  ...  Concrete examples of hierarchical hash-based signatures include XMSS MT [HRB13] , a scheme by Leighton and Micali [LM95] and SPHINCS [Be15] .  ... 
doi:10.18420/inf2019_63 dblp:conf/gi/GazdagFL19 fatcat:ssoq7uz3r5giho6bemttqcv2u4

Efficient and provably secure key agreement [chapter]

N. Alexandris, M. Burmester, V. Chrissikopoulos, D. Peppes
1996 IFIP Advances in Information and Communication Technology  
In particular, we consider two models for provable security, one based on probabilistic encryption, the other on zero-knowledge.  ...  Leighton and Micali 1994 proposed a variant of this based on probabilistic encryption.  ...  Leighton and Micali 1994 proposed a slightly different version. In the following sections we will consider two models for provably secure key agreement.  ... 
doi:10.1007/978-1-5041-2919-0_20 fatcat:l65bm7cjtzhh3ompt67hf4vv24

Page 7257 of Mathematical Reviews Vol. , Issue 97K [page]

1997 Mathematical Reviews  
Lenstra, Some remarks on Lucas-based cryptosystems (386-396); Susan K.  ...  Mark Goresky], Cryptanalysis based on 2-adic rational approximation (262-273); Lars R.  ... 

CRUST: cryptographic remote untrusted storage without public keys

Erel Geron, Avishai Wool
2009 International Journal of Information Security  
Instead we use the Leighton-Micali key pre-distribution scheme [LM93] .  ...  However, instead of relying on the asymmetry between the secret signing key and public verification key, we used a MAC-based signature scheme [NSW05] .  ...  For exchanging these keys, we use one of the methods of Leighton and Micali [LM93] .  ... 
doi:10.1007/s10207-009-0081-6 fatcat:pkyfopqgingsffluutpq4x434y

CRUST: Cryptographic Remote Untrusted Storage without Public Keys

Erel Geron, Avishai Wool
2007 Fourth International IEEE Security in Storage Workshop  
Instead we use the Leighton-Micali key pre-distribution scheme [LM93] .  ...  However, instead of relying on the asymmetry between the secret signing key and public verification key, we used a MAC-based signature scheme [NSW05] .  ...  For exchanging these keys, we use one of the methods of Leighton and Micali [LM93] .  ... 
doi:10.1109/sisw.2007.4389740 fatcat:qqsaq3wtczey3pk5otxuts5geq

CRUST: Cryptographic Remote Untrusted Storage without Public Keys

Erel Geron, Avishai Wool
2007 Fourth International IEEE Security in Storage Workshop  
Instead we use the Leighton-Micali key pre-distribution scheme [LM93] .  ...  However, instead of relying on the asymmetry between the secret signing key and public verification key, we used a MAC-based signature scheme [NSW05] .  ...  For exchanging these keys, we use one of the methods of Leighton and Micali [LM93] .  ... 
doi:10.1109/sisw.2007.9 dblp:conf/sisw/GeronW07 fatcat:uf3plrqaqveczkknxzny2i4p6u

Page 3832 of Mathematical Reviews Vol. , Issue 87g [page]

1987 Mathematical Reviews  
Micali and A. Yao, Strong signature schemes (pp. 431-439); M. Blum, How to exchange (secret) keys (pp. 440-447); H. N.  ...  Shamir, An efficient signature scheme based on quadratic equations (pp. 208-216); A. Orlitsky and A. El Gamal, Communication with se- crecy constraints (pp. 217-224); D. Dolev, D. Maier, H.  ... 

On the Role of Hash-based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions [article]

Sabah Suhail, Rasheed Hussain, Abid Khan, Choong Seon Hong
2020 arXiv   pre-print
In this paper, we investigate applications of one of the post-quantum signatures called Hash-Based Signature (HBS) schemes for the security of IoT devices in the quantum era.  ...  Currently, secure and reliable data communication in IoT is based on public-key cryptosystems such as Elliptic Curve Cryptosystem (ECC).  ...  Additionally, the LMS has two variants, i.e., Leighton Micali one-time signature (LM-OTS) and the many-time signature scheme LMS [38] . D.  ... 
arXiv:2004.10435v1 fatcat:bx6g5lidlbatpdgd3omwfk22i4

A Configurable Hardware Implementation of XMSS [article]

Jan Philipp Thoma, Tim Güneysu
2021 IACR Cryptology ePrint Archive  
In particular, we provide a full design exploration regarding the choice of parameters and hash functions to identify configurations for optimal performance and area utilization.  ...  As a fundamental building block in today's digital world, Digital Signature Schemes (DSS) provide the ability to authenticate messages exchanged over untrusted channels.  ...  The scheme is closely related to Leighton-Micali Signatures (LMS) which is also standardized by the IETF [16] , tough LMS does not have such minimal requirements for security.  ... 
dblp:journals/iacr/ThomaG21 fatcat:ojqvdla4jnhkvfg7rxjvtp62gy
« Previous Showing results 1 — 15 out of 66 results