首页> 外文OA文献 >Digital Signature Schemes Based on Hash Functions
【2h】

Digital Signature Schemes Based on Hash Functions

机译:基于哈希函数的数字签名方案

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Cryptographers and security experts around the world have been awakened to the reality that one day (potentially soon) large-scale quantum computers may be available. Most of the public-key cryptosystems employed today on the Internet, in both software and in hardware, are based on number-theoretic problems which are thought to be intractable on a classical (non-quantum) computer and hence are considered secure. The most popular such examples are the RSA encryption and signature schemes, and the Elliptic Curve Diffie-Hellman (ECDH) key-exchange protocol employed widely in the SSL/TLS protocols. However, these schemes offer essentially zero security against an adversary in possession of a large-scale quantum computer. Thus, there is an urgent need to develop, analyze and implement cryptosystems and algorithms that are secure against such adversaries. It is widely believed that cryptographic hash functions are naturally resilient to attacks by a quantum adversary, and thus, signature schemes have been developed whose security relies on this belief.The goal of this thesis is to give an overview of hash-based cryptography. We describe the most important hash-based signature schemes as well as the schemes and protocols used as subroutines within them. We give a juxtaposition between stateful and stateless signature schemes, discussing the pros and cons of both while including detailed examples. Furthermore, we detail serious flaws in the security proof for the WOTS-PRF signature scheme. This scheme had the feature that its security proof was based on minimal security assumptions, namely the pseudorandomness of the underlying function family. We explore how this flawed security argument affects the other signature schemes that utilize WOTS-PRF.
机译:全世界的密码学家和安全专家已经意识到,有一天(可能很快)可以使用大型量子计算机。当今在互联网上使用的大多数公共密钥密码系统,无论是软件还是硬件,都是基于数论问题的,这些问题在经典(非量子)计算机上是难以解决的,因此被认为是安全的。最流行的此类示例是RSA加密和签名方案,以及SSL / TLS协议中广泛采用的椭圆曲线Diffie-Hellman(ECDH)密钥交换协议。然而,这些方案对于拥有大规模量子计算机的对手基本上提供了零安全性。因此,迫切需要开发,分析和实现针对这种对手安全的密码系统和算法。人们普遍认为,密码散列函数自然可以抵抗量子对手的攻击,因此,已经开发出了签名方案,其安全性依赖于这一信念。本文的目的是概述基于散列的密码学。我们描述了最重要的基于散列的签名方案,以及其中用作子例程的方案和协议。我们将有状态签名方案与无状态签名方案并列,讨论两者的优缺点,同时提供详细的示例。此外,我们详细介绍了WOTS-PRF签名方案的安全性证明中的严重缺陷。该方案的特征在于其安全性证明基于最小的安全性假设,即基础功能族的伪随机性。我们探索这种有缺陷的安全性论点如何影响利用WOTS-PRF的其他签名方案。

著录项

  • 作者

    Lafrance Philip;

  • 作者单位
  • 年度 2017
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号