SO SÁNH ĐỘ AN TOÀN VÀ HIỆU NĂNG CỦA LƯỢC ĐỒ CHỮ KÝ SỐ MỘT LẦN W-OTS VÀ W-OTS+
Thông tin bài báo
Ngày nhận bài: 10/08/23                Ngày hoàn thiện: 17/10/23                Ngày đăng: 17/10/23Tóm tắt
Từ khóa
Toàn văn:
PDFTài liệu tham khảo
[1] K. Chalkias, J. Brown, M. Hearn, T. Lillehagen, I. Nitto, and T.Schroeter, “Blockchained Post-Quantum Signatures,” IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2018, pp. 1196 – 1203.
[2] J. S. Coron, “Optimal Security Proofs for PSS and Other Signature Schemes,” International Conference on Cryptology in Euro – EUROCRYPT, 2002, pp. 272–287.
[3] D. Johnson, A. Menezes, and Vanstone, “The Elliptic Curve Digital Signature Algorithm (ECDSA),” International Journal of Information Security, vol. 1, pp. 36–63, 2001.
[4] Y. Romailler and S. Pelissier, “Practical Fault Attack against the Ed25519 and EdDSA Signature Schemes,” Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2017, pp. 1-22.
[5] Federal Information Processing Standards Publication, “Digital Signature Standard (DSS),” 2023. [Online]. Available: https://doi.org/10.6028/NIST.FIPS.186-5. [Accessed Jul. 18, 2023].
[6] V. Srivastava, A. Baksi, and S. K. Debnath, “An Overview of Hash Based Signatures,” Cryptology ePrint Archive, no. 411, pp.?, 2023.
[7] J. Buchmann, E. Dahmen, and M. Szydlo, “Hash-based Digital Signature Schemes,” in Post-Quantum Cryptography, Springer, Chapter 8964, pp. 35–93, 2009.
[8] P. Lafrance and A. Menezes, “On the security of the WOTS-PRF signature scheme,” Cryptology ePrint Archive, no. 938, pp.?, 2017.
[9] A Hülsing, “W-OTS+ - Shorter Signatures for Hash-Based Signature Schemes,” 6th International Conference on Cryptology in Africa, Springer, Chapter 10, pp.173-188, 2013.
[10] J. Buchmann, E. Dahmen, S. Ereth, A. Hülsing, and M. Rückert, “On the security of the Winternitz one-time signature scheme,” International Conference on Cryptology in Africa – AFRICACRYPT 2011, pp. 363–378.
[11] L. P. Perin, G. Zambonin, D. M. B. Martins, R. Custódio, and J. E. Martina, "Tuning the Winternitz hash-based digital signature scheme," IEEE Symposium on Computers and Communications (ISCC), 2018, pp. 537-542.
[12] H. Heckmann, “Python implementation of Winternitz one-time-signature schemes,” [Online]. Available: https://github.com/sea212/winternitz-one-time-signature. [Accessed Jul. 26, 2023].
DOI: https://doi.org/10.34238/tnu-jst.8519
Các bài báo tham chiếu
- Hiện tại không có bài báo tham chiếu