SECURITY STRENGTH AND PERFORMANCE COMPARISON OF W-OTS AND W-OTS+ ONE-TIME DIGITAL SIGNATURES | Nghị | TNU Journal of Science and Technology

SECURITY STRENGTH AND PERFORMANCE COMPARISON OF W-OTS AND W-OTS+ ONE-TIME DIGITAL SIGNATURES

About this article

Received: 10/08/23                Revised: 17/10/23                Published: 17/10/23

Authors

1. Nguyen Van Nghi Email to author, Academy of Cryptography Techniques
2. Pham Thi Hien, Academy of Cryptography Techniques
3. Dinh Van Hung, Academy of Cryptography Techniques
4. Le Thi Bich Hang, Academy of Cryptography Techniques

Abstract


With the rapid development of quantum computers, the Shor algorithm can break all popular digital signature schemes such as RSA, ECDSA, and EdDSA in polynomial time. Therefore, post-quantum digital signature schemes are being developed to resist this attack. Digital signature schema based on the cryptographic hash function is one of the post-quantum digital signature scheme that are interested in quantity and have many published works. Two one-time digital signature schemes, W-OTS and W-OTS+, are devised and serve as the foundation for the subsequent development of more advanced post-quantum digital signature schemes, such as XMSS or SPHINCS+. In this paper, we analyze and compare the security and experimental installation performance of two digital signature schemes, W-OTS and W-OTS+, using a research method synthesized from published documents and experiments implemented with Python programming language. We provide our own commentary in addition to citations from other works on the security of these two schemes. The conclusions about the security of these two schemes in the article are cited from other works and also concluded that our own contributions.

Keywords


One Time Signature; Hash Function; W-OTS; W-OTS+; Security Strength; Performance

References


[1] K. Chalkias, J. Brown, M. Hearn, T. Lillehagen, I. Nitto, and T.Schroeter, “Blockchained Post-Quantum Signatures,” IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2018, pp. 1196 – 1203.

[2] J. S. Coron, “Optimal Security Proofs for PSS and Other Signature Schemes,” International Conference on Cryptology in Euro – EUROCRYPT, 2002, pp. 272–287.

[3] D. Johnson, A. Menezes, and Vanstone, “The Elliptic Curve Digital Signature Algorithm (ECDSA),” International Journal of Information Security, vol. 1, pp. 36–63, 2001.

[4] Y. Romailler and S. Pelissier, “Practical Fault Attack against the Ed25519 and EdDSA Signature Schemes,” Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2017, pp. 1-22.

[5] Federal Information Processing Standards Publication, “Digital Signature Standard (DSS),” 2023. [Online]. Available: https://doi.org/10.6028/NIST.FIPS.186-5. [Accessed Jul. 18, 2023].

[6] V. Srivastava, A. Baksi, and S. K. Debnath, “An Overview of Hash Based Signatures,” Cryptology ePrint Archive, no. 411, pp.?, 2023.

[7] J. Buchmann, E. Dahmen, and M. Szydlo, “Hash-based Digital Signature Schemes,” in Post-Quantum Cryptography, Springer, Chapter 8964, pp. 35–93, 2009.

[8] P. Lafrance and A. Menezes, “On the security of the WOTS-PRF signature scheme,” Cryptology ePrint Archive, no. 938, pp.?, 2017.

[9] A Hülsing, “W-OTS+ - Shorter Signatures for Hash-Based Signature Schemes,” 6th International Conference on Cryptology in Africa, Springer, Chapter 10, pp.173-188, 2013.

[10] J. Buchmann, E. Dahmen, S. Ereth, A. Hülsing, and M. Rückert, “On the security of the Winternitz one-time signature scheme,” International Conference on Cryptology in Africa – AFRICACRYPT 2011, pp. 363–378.

[11] L. P. Perin, G. Zambonin, D. M. B. Martins, R. Custódio, and J. E. Martina, "Tuning the Winternitz hash-based digital signature scheme," IEEE Symposium on Computers and Communications (ISCC), 2018, pp. 537-542.

[12] H. Heckmann, “Python implementation of Winternitz one-time-signature schemes,” [Online]. Available: https://github.com/sea212/winternitz-one-time-signature. [Accessed Jul. 26, 2023].




DOI: https://doi.org/10.34238/tnu-jst.8519

Refbacks

  • There are currently no refbacks.
TNU Journal of Science and Technology
Rooms 408, 409 - Administration Building - Thai Nguyen University
Tan Thinh Ward - Thai Nguyen City
Phone: (+84) 208 3840 288 - E-mail: jst@tnu.edu.vn
Based on Open Journal Systems
©2018 All Rights Reserved