## 371 Citations

FROG: Forward-Secure Post-Quantum Signature

- Computer Science, MathematicsArXiv
- 2022

This work proposes a new series of post-quantum signatures that is called FROG, which can achieve highly computational signatures with sub-linear key/signature sizes and (practically) unbounded signing capability and shows a better performance than the existing alternatives with forward-security, and therefore is an ideal alternative for the standardization efforts for forward-secure post-Quantum signatures.

Decentralized Digital Currency System using Merkle Hash Trees

- Computer Science, EconomicsArXiv
- 2022

This paper proposes a novel Decentralized Digital Currency System (DDCS) that makes use of Merkle Hash-Trees as Authenticated Data Structures and uses a Ledger-less, distributed, peer-to-peer architecture, and names the proposed currency $δ$-Money.

Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location

- Computer ScienceACSAC
- 2021

This work introduces a new authentication scheme, called Group TOTP (GTOTP), that allows the prover to prove that it is a member of an authenticated group without revealing its identity, and uses GTOTP to construct an efficient privacy-preserving Proof of Location (PoL) scheme.

Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors

- Computer ScienceIoTDI
- 2021

To realize BBox-IoT, a novel chain-based hash signature scheme is designed and implemented which only requires hashing operations and removes all synchronicity dependencies between signer and verifier and enables low-SWaP devices to authenticate removing reliance on clock synchronization.

Synced Hash-Based Signatures: Post-Quantum Authentication in a Blockchain

- Computer ScienceIACR Cryptol. ePrint Arch.
- 2020

The proposed HBS scheme shows that the signatures can become more efficient as the number of signatures grows, and this paper studies HBS in a blockchain, like bitcoin: a public, decentralized database.

A scalable post-quantum hash-based group signature

- Computer ScienceIACR Cryptol. ePrint Arch.
- 2019

This work presents a construction for hash-based one-time group signature schemes, and develops a traceable post-quantum multi- time group signature upon it, and extends the scheme to multi-time signatures using Merkle trees and shows that this process maintains the scalability property of MerKle-based signatures.

Proof of aliveness

- Computer ScienceACSAC
- 2019

A one-way function (OWF) chain structure is proposed to be used to build an efficient proof of aliveness, such that the prover sends every node on the OWF chain in a reverse order periodically, and it can be verified by a verifier with the possession of the tail (last node), which implies that this PoA can be used forever without an interruption for reinitialization.

Advances in Quantum Cryptography

- Computer Science
- 2019

This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.

Improved mathematical model of the post-quantum eletronic signature mechanism

- Computer Science
- 2018

In the paper improved mechanism called POST which can be used in post-quantum period is proposed and tends to avoid the disadvantages as previous ones.

Post-quantum blockchain using one-time signature chains

- Computer Science, Mathematics
- 2018

This work constructs a quantum secure signature scheme for use in blockchain technology by combining a hash-based one-time signature scheme with Naor-Yung chaining, and achieves smaller signatures and better performance than existing hash- based signature schemes.

## References

SHOWING 1-4 OF 4 REFERENCES

Digitalized Signatures

- Digitalized Signatures

Secure computing

- Computer Science, Mathematics2010 IEEE International Symposium on Information Theory
- 2010

It is shown that a function is securely computable if and only if its entropy is smaller than the secret key capacity.

New directions in cryptography

- Computer Science, MathematicsIEEE Trans. Inf. Theory
- 1976

This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.

IEEE Trans, ^n Information Theory IT-22

- IEEE Trans, ^n Information Theory IT-22
- 1976