• Corpus ID: 59679804

Constructing Digital Signatures from a One Way Function

@inproceedings{Lamport2016ConstructingDS,
  title={Constructing Digital Signatures from a One Way Function},
  author={Leslie Lamport},
  year={2016}
}
FROG: Forward-Secure Post-Quantum Signature
TLDR
This work proposes a new series of post-quantum signatures that is called FROG, which can achieve highly computational signatures with sub-linear key/signature sizes and (practically) unbounded signing capability and shows a better performance than the existing alternatives with forward-security, and therefore is an ideal alternative for the standardization efforts for forward-secure post-Quantum signatures.
Decentralized Digital Currency System using Merkle Hash Trees
TLDR
This paper proposes a novel Decentralized Digital Currency System (DDCS) that makes use of Merkle Hash-Trees as Authenticated Data Structures and uses a Ledger-less, distributed, peer-to-peer architecture, and names the proposed currency $δ$-Money.
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location
TLDR
This work introduces a new authentication scheme, called Group TOTP (GTOTP), that allows the prover to prove that it is a member of an authenticated group without revealing its identity, and uses GTOTP to construct an efficient privacy-preserving Proof of Location (PoL) scheme.
Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors
TLDR
To realize BBox-IoT, a novel chain-based hash signature scheme is designed and implemented which only requires hashing operations and removes all synchronicity dependencies between signer and verifier and enables low-SWaP devices to authenticate removing reliance on clock synchronization.
Synced Hash-Based Signatures: Post-Quantum Authentication in a Blockchain
TLDR
The proposed HBS scheme shows that the signatures can become more efficient as the number of signatures grows, and this paper studies HBS in a blockchain, like bitcoin: a public, decentralized database.
A scalable post-quantum hash-based group signature
TLDR
This work presents a construction for hash-based one-time group signature schemes, and develops a traceable post-quantum multi- time group signature upon it, and extends the scheme to multi-time signatures using Merkle trees and shows that this process maintains the scalability property of MerKle-based signatures.
Proof of aliveness
TLDR
A one-way function (OWF) chain structure is proposed to be used to build an efficient proof of aliveness, such that the prover sends every node on the OWF chain in a reverse order periodically, and it can be verified by a verifier with the possession of the tail (last node), which implies that this PoA can be used forever without an interruption for reinitialization.
Advances in Quantum Cryptography
TLDR
This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.
Improved mathematical model of the post-quantum eletronic signature mechanism
TLDR
In the paper improved mechanism called POST which can be used in post-quantum period is proposed and tends to avoid the disadvantages as previous ones.
Post-quantum blockchain using one-time signature chains
TLDR
This work constructs a quantum secure signature scheme for use in blockchain technology by combining a hash-based one-time signature scheme with Naor-Yung chaining, and achieves smaller signatures and better performance than existing hash- based signature schemes.
...
...

References

SHOWING 1-4 OF 4 REFERENCES
Digitalized Signatures
  • Digitalized Signatures
Secure computing
TLDR
It is shown that a function is securely computable if and only if its entropy is smaller than the secret key capacity.
New directions in cryptography
TLDR
This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
IEEE Trans, ^n Information Theory IT-22
  • IEEE Trans, ^n Information Theory IT-22
  • 1976