A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
State Management for Hash-Based Signatures
[chapter]
2016
Lecture Notes in Computer Science
While the theory of hash-based signatures is mature, a discussion of the system security issues arising from the concrete management of their state has been lacking. ...
In this paper, we analyze state management in N -time hash-based signature schemes, considering both security and performance, and categorize the security issues that can occur due to state synchronization ...
To the best of our knowledge, no work addressing state management strategies for stateful hash-based signatures exists so far. ...
doi:10.1007/978-3-319-49100-4_11
fatcat:qq54nyxr7naelmq2xdxhzwyica
New Hashing Algorithm for Use in TCP Reassembly Module of IPS
[article]
2015
arXiv
pre-print
Signature based IDS/ IPS can be stateless or stateful. Stateful IDS can store the state of the protocol and use it for better detection of malware. ...
Thus we show how an algorithm based on cryptography concepts can be used for efficient hashing in network connection management. ...
Then the authors discuss how hashing is important for an efficient way of TCP connection management. Then they discuss prevalent hashing mechanisms. The authors then propose new hashing algorithm. ...
arXiv:1501.02062v1
fatcat:3gpy3rapfvefhnlcaz6iqtcl5a
Hash-based signature revisited
2022
Cybersecurity
The goal of this paper is to present, classify and discuss different solutions for hash-based signature. ...
of hash-based signature into limited number and stateful schemes, unlimited number and stateful schemes and unlimited number and stateless schemes. ...
Stateless hash-based signature settles state management at the cost of significantly higher signature size compared with the stateful ones in the analogous security level. ...
doi:10.1186/s42400-022-00117-w
fatcat:ssugdb7crnhmfhdqct55td45du
G-Merkle: A Hash-Based Group Signature Scheme from Standard Assumptions
[chapter]
2018
Lecture Notes in Computer Science
In this work, we introduce G-Merkle, the first (stateful) hash-based group signature scheme. ...
Moreover, for N group members issuing at most B signatures each, the size of a hash-based group signature is just as large as a Merkle signature with a tree composed by N · B leaf nodes. ...
Acknowledgements We thank Andreas Hülsing for engaging in helpful discussions and the anonymous reviewers for providing detailed comments. ...
doi:10.1007/978-3-319-79063-3_21
fatcat:4mpqtc4nove3vaqeej2b7ubhpe
Text/Conference Paper
2019
Jahrestagung der Gesellschaft für Informatik
Nevertheless, there are some peculiarities that need consideration when using hash-based signatures in practice, for example the statefulness of some of the primitives. ...
In this paper we detail the troubles we encountered when using hash-based signatures in practice and study the most important use case for hash-based signatures: software or code signing. ...
We thank Hans-Jörg Hoexer for collecting the benchmark-data given in Table 1 and Tobias Heider for his review. ...
doi:10.18420/inf2019_63
dblp:conf/gi/GazdagFL19
fatcat:ssoq7uz3r5giho6bemttqcv2u4
Hash-Based Signature for Flexibility Authentication of IoT Devices
2022
Wuhan University Journal of Natural Sciences
It provides flexible and high-quality authentication services for IoT devices cluster in the 5G environment combining the advantages of Hash-based signature technology and 5G architecture. ...
5G provides a unified authentication architecture and access management for IoT (Internet of Things) devices. ...
in the state and standardization of Hash-based signatures. ...
doi:10.1051/wujns/2022271001
fatcat:3ihldkezv5coxewbskp4mcfy5a
ELECTRONIC SIGNATURE, TOOL FOR OPTIMIZING THE MANAGEMENT OF INFORMATION IN ELECTRONIC FORMAT
2022
STRATEGIES XXI: The Complex and Dynamic Nature of the Security Environment
The way of managing information in electronic format is a concern of specialists in both military and civilian fields in terms of optimizing the process of managing information in electronic format due ...
The development of the IT & C field produces changes in the way of organizing and functioning of all civilian organizations as well as for those in the military field. ...
DSA (Digital Signature Algorithm) -The digital signature algorithm is a standard of the United States government for digital signatures. ...
doi:10.53477/2668-6511-22-11
fatcat:vybocjhsqjdx7et2tjabmpup3q
Accumulate: An identity-based blockchain protocol with cross-chain support, human-readable addresses, and key management capabilities
[article]
2022
arXiv
pre-print
Each ADI also possesses a hierarchical set of keys with different priority levels that allow users to manage their security over time and create complex signature authorization schemes that expand the ...
utility of multi-signature transactions. ...
Since the entire state of the SMT is captured in the root hashes, the previous hashes can be discarded or 'pruned' SMT as hashes are added
SMT State Added hash Fig. 7 Adding hashes to a Stateful Merkle ...
arXiv:2204.06878v1
fatcat:p2lmqvitfndqblh4keyrraxtae
Secure producer mobility in information-centric network
2017
Proceedings of the 4th ACM Conference on Information-Centric Networking - ICN '17
To prevent this class of attacks, we propose a fully distributed and very low-overhead protocol for name prefix attestation based on hash-chaining. ...
Previous work in ICN literature focused on name-based mobility management solutions and particularly on the challenges of producer mobility, which involves an interaction between forwarding and control ...
Table 2 reports the time required for the hash-based verification and the signature-based verification. ...
doi:10.1145/3125719.3125725
dblp:conf/acmicn/Compagno0MCA17
fatcat:hsn7wdde3rfrdceope6knuyv4y
Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation
[chapter]
2010
Lecture Notes in Computer Science
One of the central aims of Trusted Computing is to provide the ability to attest that a remote platform is in a certain trustworthy state. ...
In this paper we show how chameleon hashes allow to mitigate of these two problems. By using a prototypical implementation we furthermore show that the approach is feasible in practice. ...
are based on either chameleon hashes or group signatures. ...
doi:10.1007/978-3-642-13869-0_5
fatcat:mqidtnqacfdfjbjw5ichtevv4q
Accumulate Whitepaper
2022
figshare.com
Each \acs{ADI} also possesses a hierarchical set of keys with different priority levels that allow users to manage their security over time and create complex signature authorization schemes that expand ...
the utility of multi-signature transactions. ...
Fig. 7 7 Fig. 7 Adding hashes to a Stateful Merkle Tree.
Fig. 8 8 Fig. 8 Collecting signatures on the Signature Chain and promoting the transaction hashes to the Main Chain. ...
doi:10.6084/m9.figshare.19586515.v2
fatcat:ziulsdv22jeetg3ugcuvqw7pae
Accumulate Whitepaper
2022
figshare.com
Each \acs{ADI} also possesses a hierarchical set of keys with different priority levels that allow users to manage their security over time and create complex signature authorization schemes that expand ...
the utility of multi-signature transactions. ...
Fig. 7 7 Fig. 7 Adding hashes to a Stateful Merkle Tree.
Fig. 8 8 Fig. 8 Collecting signatures on the Signature Chain and promoting the transaction hashes to the Main Chain. ...
doi:10.6084/m9.figshare.19586515.v3
fatcat:p2uyznqab5h3zgexruzbjcl2lq
Accumulate Whitepaper
2022
figshare.com
Each \acs{ADI} also possesses a hierarchical set of keys with different priority levels that allow users to manage their security over time and create complex signature authorization schemes that expand ...
the utility of multi-signature transactions. ...
Fig. 7 7 Fig. 7 Adding hashes to a Stateful Merkle Tree.
Fig. 8 8 Fig. 8 Collecting signatures on the Signature Chain and promoting the transaction hashes to the Main Chain. ...
doi:10.6084/m9.figshare.19586515.v1
fatcat:igjejb6uvja3hnka4cjx6r2wou
Design and Implementation of a Digital Signature Solution for a Healthcare Enterprise
2004
Americas Conference on Information Systems
An in-depth description of the first six stages for this case, including guidelines for choosing digital signature solutions, vendor analyses, and implementation issues, are provided. ...
This paper presents a case study of a digital signature solution implementation for a healthcare organization that provides disability evaluation services for various government agencies and private companies ...
Once Bob has the hashed message, he uses the public key digital signature algorithm and his private key to sign the hash to generate a digital signature for the specific document. ...
dblp:conf/amcis/TuluLCHLH04
fatcat:wz37xa3oxbclja7ylv2g76oosy
A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments
2018
KSII Transactions on Internet and Information Systems
Among them, Keyless Signature Infrastructure(KSI) provides integrity by configuring user authentication and global timestamp of distributed server into block chain by using hash-based one-time key. ...
In this paper, we provide confidentiality by applying group key and key management based on multi -solution chain. ...
-In addition, since the hash functions used for authentication management and communication based on KSI have safety based on the hash strength to be used, the following security requirements are required ...
doi:10.3837/tiis.2018.02.021
fatcat:prjyyr6itvdizpuvmwi5llswge
« Previous
Showing results 1 — 15 out of 26,233 results