Affiliation:
1. Cambridge Univ. Computer Laboratory, England
2. Univ. di Torinto, Italy
3. Microsoft Research, Cambridge, England
Abstract
We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous constructions. Previously, one-time digital signatures based on hash functions involved hundreds of hash function computations for each signature; we show that given online access to a timestamping service, we can sign messages using only two computations of a hash function. Previously, techniques to sign infinite streams involved one such one-time signature for each message block; we show that in many realistic scenarios a small number of hash function computations is sufficient. Previously, the Diffie Hellman protocol enabled two principals to create a confidentiality key from scratch: we provide an equivalent protocol for integrity, which enables two people who do not share a secret to set up a securely serialised channel into which attackers cannot subsequently intrude. In addition to being of potential use in real applications, our constructions also raise interesting questions about the definition of a digital signature, and the relationship between integrity and authenticity.
Publisher
Association for Computing Machinery (ACM)
Cited by
58 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Efficient and reliable post-quantum authentication;Theoretical Computer Science;2024-07
2. Stream and Multicast Authentication;Encyclopedia of Cryptography, Security and Privacy;2024
3. References;Organization and Governance Using Algorithms;2023-11-29
4. A Secure Cloud Gaming System;J INF SCI ENG;2023
5. ESSD: Energy Saving and Securing Data Algorithm for WSNs Security;Computers, Materials & Continua;2022