SECURITY STRENGTH AND PERFORMANCE COMPARISON OF W-OTS AND W-OTS+ ONE-TIME DIGITAL SIGNATURES
About this article
Received: 10/08/23                Revised: 17/10/23                Published: 17/10/23Abstract
Keywords
Full Text:
PDF (Tiếng Việt)References
[1] K. Chalkias, J. Brown, M. Hearn, T. Lillehagen, I. Nitto, and T.Schroeter, “Blockchained Post-Quantum Signatures,” IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2018, pp. 1196 – 1203.
[2] J. S. Coron, “Optimal Security Proofs for PSS and Other Signature Schemes,” International Conference on Cryptology in Euro – EUROCRYPT, 2002, pp. 272–287.
[3] D. Johnson, A. Menezes, and Vanstone, “The Elliptic Curve Digital Signature Algorithm (ECDSA),” International Journal of Information Security, vol. 1, pp. 36–63, 2001.
[4] Y. Romailler and S. Pelissier, “Practical Fault Attack against the Ed25519 and EdDSA Signature Schemes,” Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2017, pp. 1-22.
[5] Federal Information Processing Standards Publication, “Digital Signature Standard (DSS),” 2023. [Online]. Available: https://doi.org/10.6028/NIST.FIPS.186-5. [Accessed Jul. 18, 2023].
[6] V. Srivastava, A. Baksi, and S. K. Debnath, “An Overview of Hash Based Signatures,” Cryptology ePrint Archive, no. 411, pp.?, 2023.
[7] J. Buchmann, E. Dahmen, and M. Szydlo, “Hash-based Digital Signature Schemes,” in Post-Quantum Cryptography, Springer, Chapter 8964, pp. 35–93, 2009.
[8] P. Lafrance and A. Menezes, “On the security of the WOTS-PRF signature scheme,” Cryptology ePrint Archive, no. 938, pp.?, 2017.
[9] A Hülsing, “W-OTS+ - Shorter Signatures for Hash-Based Signature Schemes,” 6th International Conference on Cryptology in Africa, Springer, Chapter 10, pp.173-188, 2013.
[10] J. Buchmann, E. Dahmen, S. Ereth, A. Hülsing, and M. Rückert, “On the security of the Winternitz one-time signature scheme,” International Conference on Cryptology in Africa – AFRICACRYPT 2011, pp. 363–378.
[11] L. P. Perin, G. Zambonin, D. M. B. Martins, R. Custódio, and J. E. Martina, "Tuning the Winternitz hash-based digital signature scheme," IEEE Symposium on Computers and Communications (ISCC), 2018, pp. 537-542.
[12] H. Heckmann, “Python implementation of Winternitz one-time-signature schemes,” [Online]. Available: https://github.com/sea212/winternitz-one-time-signature. [Accessed Jul. 26, 2023].
DOI: https://doi.org/10.34238/tnu-jst.8519
Refbacks
- There are currently no refbacks.





