EconPapers    
Economics at your fingertips  
 

Hash-based Digital Signature Schemes

Johannes Buchmann (), Erik Dahmen () and Michael Szydlo ()
Additional contact information
Michael Szydlo: Akamai Technologies

A chapter in Post-Quantum Cryptography, 2009, pp 35-93 from Springer

Abstract: Digital signatures have become a key technology for making the Internet and other IT-infrastructures secure. Digital signatures provide authenticity, integrity, and non-repudiation of data. Digital signatures are widely used in identification and authentication protocols. Therefore, the existence of secure digital signature algorithms is crucial for maintaining IT-security. The digital signature algorithms that are used in practice today are RSA [31], DSA [11], and ECDSA [15]. They are not quantum immune since their security relies on the difficulty of factoring large composite integers and computing discrete logarithms.

Keywords: Hash Function; Signature Scheme; Pseudo Random Number Generator; Tree Traversal; Cryptographic Hash Function (search for similar items in EconPapers)
Date: 2009
References: Add references at CitEc
Citations: View citations in EconPapers (1)

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-540-88702-7_3

Ordering information: This item can be ordered from
http://www.springer.com/9783540887027

DOI: 10.1007/978-3-540-88702-7_3

Access Statistics for this chapter

More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2026-05-21
Handle: RePEc:spr:sprchp:978-3-540-88702-7_3