Filters








26,233 Hits in 5.1 sec

State Management for Hash-Based Signatures [chapter]

David McGrew, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann
2016 Lecture Notes in Computer Science  
While the theory of hash-based signatures is mature, a discussion of the system security issues arising from the concrete management of their state has been lacking.  ...  In this paper, we analyze state management in N -time hash-based signature schemes, considering both security and performance, and categorize the security issues that can occur due to state synchronization  ...  To the best of our knowledge, no work addressing state management strategies for stateful hash-based signatures exists so far.  ... 
doi:10.1007/978-3-319-49100-4_11 fatcat:qq54nyxr7naelmq2xdxhzwyica

New Hashing Algorithm for Use in TCP Reassembly Module of IPS [article]

Sankalp Bagaria
2015 arXiv   pre-print
Signature based IDS/ IPS can be stateless or stateful. Stateful IDS can store the state of the protocol and use it for better detection of malware.  ...  Thus we show how an algorithm based on cryptography concepts can be used for efficient hashing in network connection management.  ...  Then the authors discuss how hashing is important for an efficient way of TCP connection management. Then they discuss prevalent hashing mechanisms. The authors then propose new hashing algorithm.  ... 
arXiv:1501.02062v1 fatcat:3gpy3rapfvefhnlcaz6iqtcl5a

Hash-based signature revisited

Lingyun Li, Xianhui Lu, Kunpeng Wang
2022 Cybersecurity  
The goal of this paper is to present, classify and discuss different solutions for hash-based signature.  ...  of hash-based signature into limited number and stateful schemes, unlimited number and stateful schemes and unlimited number and stateless schemes.  ...  Stateless hash-based signature settles state management at the cost of significantly higher signature size compared with the stateful ones in the analogous security level.  ... 
doi:10.1186/s42400-022-00117-w fatcat:ssugdb7crnhmfhdqct55td45du

G-Merkle: A Hash-Based Group Signature Scheme from Standard Assumptions [chapter]

Rachid El Bansarkhani, Rafael Misoczki
2018 Lecture Notes in Computer Science  
In this work, we introduce G-Merkle, the first (stateful) hash-based group signature scheme.  ...  Moreover, for N group members issuing at most B signatures each, the size of a hash-based group signature is just as large as a Merkle signature with a tree composed by N · B leaf nodes.  ...  Acknowledgements We thank Andreas Hülsing for engaging in helpful discussions and the anonymous reviewers for providing detailed comments.  ... 
doi:10.1007/978-3-319-79063-3_21 fatcat:4mpqtc4nove3vaqeej2b7ubhpe

Text/Conference Paper

Stefan-Lukas Gazdag, Markus Friedl, Daniel Loebenberger
2019 Jahrestagung der Gesellschaft für Informatik  
Nevertheless, there are some peculiarities that need consideration when using hash-based signatures in practice, for example the statefulness of some of the primitives.  ...  In this paper we detail the troubles we encountered when using hash-based signatures in practice and study the most important use case for hash-based signatures: software or code signing.  ...  We thank Hans-Jörg Hoexer for collecting the benchmark-data given in Table 1 and Tobias Heider for his review.  ... 
doi:10.18420/inf2019_63 dblp:conf/gi/GazdagFL19 fatcat:ssoq7uz3r5giho6bemttqcv2u4

Hash-Based Signature for Flexibility Authentication of IoT Devices

Songshen HAN, Kaiyong XU, Zhiqiang ZHU, Songhui GUO, Haidong LIU, Zuohui LI
2022 Wuhan University Journal of Natural Sciences  
It provides flexible and high-quality authentication services for IoT devices cluster in the 5G environment combining the advantages of Hash-based signature technology and 5G architecture.  ...  5G provides a unified authentication architecture and access management for IoT (Internet of Things) devices.  ...  in the state and standardization of Hash-based signatures.  ... 
doi:10.1051/wujns/2022271001 fatcat:3ihldkezv5coxewbskp4mcfy5a

ELECTRONIC SIGNATURE, TOOL FOR OPTIMIZING THE MANAGEMENT OF INFORMATION IN ELECTRONIC FORMAT

Lucian SCÎRTOCEA
2022 STRATEGIES XXI: The Complex and Dynamic Nature of the Security Environment  
The way of managing information in electronic format is a concern of specialists in both military and civilian fields in terms of optimizing the process of managing information in electronic format due  ...  The development of the IT & C field produces changes in the way of organizing and functioning of all civilian organizations as well as for those in the military field.  ...  DSA (Digital Signature Algorithm) -The digital signature algorithm is a standard of the United States government for digital signatures.  ... 
doi:10.53477/2668-6511-22-11 fatcat:vybocjhsqjdx7et2tjabmpup3q

Accumulate: An identity-based blockchain protocol with cross-chain support, human-readable addresses, and key management capabilities [article]

Kyle Michelson, Anjali Sridharan, Umut Can Çabuk, Ethan Reesor, Ben Stolman, Drew Mailen, Dennis Bunfield, Jay Smith, Paul Snow
2022 arXiv   pre-print
Each ADI also possesses a hierarchical set of keys with different priority levels that allow users to manage their security over time and create complex signature authorization schemes that expand the  ...  utility of multi-signature transactions.  ...  Since the entire state of the SMT is captured in the root hashes, the previous hashes can be discarded or 'pruned' SMT as hashes are added SMT State Added hash Fig. 7 Adding hashes to a Stateful Merkle  ... 
arXiv:2204.06878v1 fatcat:p2lmqvitfndqblh4keyrraxtae

Secure producer mobility in information-centric network

Alberto Compagno, Xuan Zeng, Luca Muscariello, Giovanna Carofiglio, Jordan Augé
2017 Proceedings of the 4th ACM Conference on Information-Centric Networking - ICN '17  
To prevent this class of attacks, we propose a fully distributed and very low-overhead protocol for name prefix attestation based on hash-chaining.  ...  Previous work in ICN literature focused on name-based mobility management solutions and particularly on the challenges of producer mobility, which involves an interaction between forwarding and control  ...  Table 2 reports the time required for the hash-based verification and the signature-based verification.  ... 
doi:10.1145/3125719.3125725 dblp:conf/acmicn/Compagno0MCA17 fatcat:hsn7wdde3rfrdceope6knuyv4y

Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation [chapter]

Sami Alsouri, Özgür Dagdelen, Stefan Katzenbeisser
2010 Lecture Notes in Computer Science  
One of the central aims of Trusted Computing is to provide the ability to attest that a remote platform is in a certain trustworthy state.  ...  In this paper we show how chameleon hashes allow to mitigate of these two problems. By using a prototypical implementation we furthermore show that the approach is feasible in practice.  ...  are based on either chameleon hashes or group signatures.  ... 
doi:10.1007/978-3-642-13869-0_5 fatcat:mqidtnqacfdfjbjw5ichtevv4q

Accumulate Whitepaper

Kyle Michelson, Anjali Sridharan, Umut Can Çabuk, Ethan Reesor, Ben Stolman, Drew Mailen, Dennis Bunfield, Jay Smith, Paul Snow
2022 figshare.com  
Each \acs{ADI} also possesses a hierarchical set of keys with different priority levels that allow users to manage their security over time and create complex signature authorization schemes that expand  ...  the utility of multi-signature transactions.  ...  Fig. 7 7 Fig. 7 Adding hashes to a Stateful Merkle Tree. Fig. 8 8 Fig. 8 Collecting signatures on the Signature Chain and promoting the transaction hashes to the Main Chain.  ... 
doi:10.6084/m9.figshare.19586515.v2 fatcat:ziulsdv22jeetg3ugcuvqw7pae

Accumulate Whitepaper

Kyle Michelson, Anjali Sridharan, Umut Can Çabuk, Ethan Reesor, Ben Stolman, Drew Mailen, Dennis Bunfield, Jay Smith, Paul Snow
2022 figshare.com  
Each \acs{ADI} also possesses a hierarchical set of keys with different priority levels that allow users to manage their security over time and create complex signature authorization schemes that expand  ...  the utility of multi-signature transactions.  ...  Fig. 7 7 Fig. 7 Adding hashes to a Stateful Merkle Tree. Fig. 8 8 Fig. 8 Collecting signatures on the Signature Chain and promoting the transaction hashes to the Main Chain.  ... 
doi:10.6084/m9.figshare.19586515.v3 fatcat:p2uyznqab5h3zgexruzbjcl2lq

Accumulate Whitepaper

Kyle Michelson, Anjali Sridharan, Umut Can Çabuk, Ethan Reesor, Ben Stolman, Drew Mailen, Dennis Bunfield, Jay Smith, Paul Snow
2022 figshare.com  
Each \acs{ADI} also possesses a hierarchical set of keys with different priority levels that allow users to manage their security over time and create complex signature authorization schemes that expand  ...  the utility of multi-signature transactions.  ...  Fig. 7 7 Fig. 7 Adding hashes to a Stateful Merkle Tree. Fig. 8 8 Fig. 8 Collecting signatures on the Signature Chain and promoting the transaction hashes to the Main Chain.  ... 
doi:10.6084/m9.figshare.19586515.v1 fatcat:igjejb6uvja3hnka4cjx6r2wou

Design and Implementation of a Digital Signature Solution for a Healthcare Enterprise

Bengisu Tulu, Haiqing Li, Samir Chatterjee, Brian N. Hilton, Deborah Beranek Lafky, Thomas A. Horan
2004 Americas Conference on Information Systems  
An in-depth description of the first six stages for this case, including guidelines for choosing digital signature solutions, vendor analyses, and implementation issues, are provided.  ...  This paper presents a case study of a digital signature solution implementation for a healthcare organization that provides disability evaluation services for various government agencies and private companies  ...  Once Bob has the hashed message, he uses the public key digital signature algorithm and his private key to sign the hash to generate a digital signature for the specific document.  ... 
dblp:conf/amcis/TuluLCHLH04 fatcat:wz37xa3oxbclja7ylv2g76oosy

A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments

2018 KSII Transactions on Internet and Information Systems  
Among them, Keyless Signature Infrastructure(KSI) provides integrity by configuring user authentication and global timestamp of distributed server into block chain by using hash-based one-time key.  ...  In this paper, we provide confidentiality by applying group key and key management based on multi -solution chain.  ...  -In addition, since the hash functions used for authentication management and communication based on KSI have safety based on the hash strength to be used, the following security requirements are required  ... 
doi:10.3837/tiis.2018.02.021 fatcat:prjyyr6itvdizpuvmwi5llswge
« Previous Showing results 1 — 15 out of 26,233 results