Hash-based Digital Signature Schemes
Johannes Buchmann (),
Erik Dahmen () and
Michael Szydlo ()
Additional contact information
Michael Szydlo: Akamai Technologies
A chapter in Post-Quantum Cryptography, 2009, pp 35-93 from Springer
Abstract:
Digital signatures have become a key technology for making the Internet and other IT-infrastructures secure. Digital signatures provide authenticity, integrity, and non-repudiation of data. Digital signatures are widely used in identification and authentication protocols. Therefore, the existence of secure digital signature algorithms is crucial for maintaining IT-security. The digital signature algorithms that are used in practice today are RSA [31], DSA [11], and ECDSA [15]. They are not quantum immune since their security relies on the difficulty of factoring large composite integers and computing discrete logarithms.
Keywords: Hash Function; Signature Scheme; Pseudo Random Number Generator; Tree Traversal; Cryptographic Hash Function (search for similar items in EconPapers)
Date: 2009
References: Add references at CitEc
Citations: View citations in EconPapers (1)
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-540-88702-7_3
Ordering information: This item can be ordered from
http://www.springer.com/9783540887027
DOI: 10.1007/978-3-540-88702-7_3
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().