Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJuly 2024
Revisiting the Security of Fiat-Shamir Signature Schemes Under Superposition Attacks
AbstractThe Fiat-Shamir transformation is a widely employed technique in constructing signature schemes, known as Fiat-Shamir signature schemes (FS-SIG), derived from secure identification (ID) schemes. However, the existing security proof only takes into ...
- rfcNovember 2024
RFC 9580: OpenPGP
This document specifies the message formats used in OpenPGP. OpenPGP provides encryption with public key or symmetric cryptographic algorithms, digital signatures, compression, and key management.
This document is maintained in order to publish all ...
- research-articleJuly 2024
Digital Signatures for Authenticating Compressed JPEG Images
SCID '24: Proceedings of the 1st Workshop on Security-Centric Strategies for Combating Information DisorderArticle No.: 4, Pages 1–12https://doi.org/10.1145/3660512.3665522We construct a digital signature scheme for images that allows the image to be compressed without invalidating the signature. More specifically, given a JPEG image signed with our signature scheme, a third party can compress the image using JPEG ...
- research-articleMarch 2024
Post-Quantum Signatures on RISC-V with Hardware Acceleration
ACM Transactions on Embedded Computing Systems (TECS), Volume 23, Issue 2Article No.: 30, Pages 1–23https://doi.org/10.1145/3579092CRYSTALS-Dilithium and Falcon are digital signature algorithms based on cryptographic lattices, which are considered secure even if large-scale quantum computers will be able to break conventional public-key cryptography. Both schemes have been selected ...
- ArticleJune 2024
Forging Tropical Signatures
Applied Cryptography and Network Security WorkshopsPages 3–7https://doi.org/10.1007/978-3-031-61489-7_1AbstractA recent preprint [3] suggests the use of polynomials over a tropical algebra to construct a digital signature scheme “based on” the problem of factoring such polynomials, which is known to be NP-hard. This short note presents two very efficient ...
-
- research-articleNovember 2023
Enabling Lattice-Based Post-Quantum Cryptography on the OpenTitan Platform
ASHES '23: Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware SecurityPages 51–60https://doi.org/10.1145/3605769.3623993The first generation of post-quantum cryptography (PQC) standards by the National Institute of Standards and Technology (NIST) is just around the corner. The need for secure implementations is therefore increasing. In this work, we address this need and ...
- research-articleNovember 2023
Generic Construction of Key-Aggregate Searchable Encryption
GeoPrivacy '23: Proceedings of the 1st ACM SIGSPATIAL International Workshop on Geo-Privacy and Data Utility for Smart SocietiesPages 1–4https://doi.org/10.1145/3615889.3628512A key-aggregate searchable encryption (KASE) scheme is an encryption scheme that enables a user to search plaintexts under their ciphertexts and control access to the ciphertexts for other users. This paper proposes a generic construction of KASE, ...
- ArticleOctober 2023
Quotable Signatures for Authenticating Shared Quotes
AbstractQuotable signature schemes are digital signature schemes with the additional property that from the signature for a message, any party can extract signatures for (allowable) quotes from the message, without knowing the secret key or interacting ...
- ArticleAugust 2023
Non-Observable Quantum Random Oracle Model
AbstractThe random oracle model (ROM), introduced by Bellare and Rogaway (CCS 1993), enables a formal security proof for many (efficient) cryptographic primitives and protocols, and has been quite impactful in practice. However, the security model also ...
- research-articleJuly 2023
Solving blockchain trilemma using off‐chain storage protocol
AbstractTrilemma in blockchain refers to the infamous problem of simultaneously not delivering the three critical aspects of a ledger: security, scalability, and decentralisation. While security and scalability hinder decentralisation, security is ...
The proposed technique solves the infamous trilemma issue of blockchain. InterPlanetary File System (IPFS), a P2P‐based off‐chain storage, is utilised to ensure that the security is not compromised while stabilising scalability and decentralisation. image ...
- ArticleJuly 2023
Quantum-Access Security of Hash-Based Signature Schemes
AbstractIn post-quantum cryptography, hash-based signature schemes are attractive choices because of the weak assumptions. Most existing hash-based signature schemes are proven secure against post-quantum chosen message attacks (CMAs), where the ...
- research-articleMay 2023
Practical Cryptographic Forensic Tools for Lightweight Internet of Things and Cold Storage Systems
IoTDI '23: Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and ImplementationPages 340–353https://doi.org/10.1145/3576842.3582376Internet of Things (IoT) and Storage-as-a-Service (STaaS) continuum permit cost-effective maintenance of security-sensitive information collected by IoT devices over cloud systems. It is necessary to guarantee the security of sensitive data in IoT-STaaS ...
- research-articleApril 2023
A new code‐based digital signature based on the McEliece cryptosystem
AbstractDigital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, ...
A new code‐based digital signature based on McEliece cryptosystems is proposed. To the authors knowledge, the proposed scheme is the first code‐based digital signature based on McEliece with the lower processing time required to construct a valid digital ...
- surveyMarch 2023
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions
- Maxime Buser,
- Rafael Dowsley,
- Muhammed Esgin,
- Clémentine Gritti,
- Shabnam Kasra Kermanshahi,
- Veronika Kuchta,
- Jason Legrow,
- Joseph Liu,
- Raphaël Phan,
- Amin Sakzad,
- Ron Steinfeld,
- Jiangshan Yu
ACM Computing Surveys (CSUR), Volume 55, Issue 12Article No.: 251, Pages 1–32https://doi.org/10.1145/3572771Blockchain technology provides efficient and secure solutions to various online activities by utilizing a wide range of cryptographic tools. In this article, we survey the existing literature on post-quantum secure digital signatures that possess exotic ...
- research-articleNovember 2022
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 843–857https://doi.org/10.1145/3548606.3559353Signature schemes based on the MPC-in-the-head approach (MPCitH) have either been designed by taking a proof system and selecting a suitable symmetric-key primitive (Picnic, CCS16), or starting with an existing primitive such as AES and trying to find ...
- research-articleJuly 2022
Optimal Clock Synchronization with Signatures
PODC'22: Proceedings of the 2022 ACM Symposium on Principles of Distributed ComputingPages 440–449https://doi.org/10.1145/3519270.3538444Cryptographic signatures can be used to increase the resilience of distributed systems against adversarial attacks, by increasing the number of faulty parties that can be tolerated. While this is well-studied for consensus, it has been underexplored in ...
- abstractMay 2022
APKC '22: 9th ACM ASIA Public-Key Cryptography Workshop
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications SecurityPages 1261–1262https://doi.org/10.1145/3488932.3517200Public key cryptography plays an essential role in ensuring many security properties required in data processing of various kinds. The theme of this workshop is novel public-key cryptosystems for solving a wide range of real-life application problems. ...
- ArticleMarch 2022
Double-Authentication-Preventing Signatures
AbstractDigital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that ...
- research-articleAugust 2021
Security notions for stateful signature schemes
AbstractIn some digital signature schemes, the signer needs to maintain a dynamic state while signing messages. These are called stateful signature schemes. Although stateful signature schemes are commonly used as cryptographic primitives, they do not fit ...