Hash-based Digital Signature Schemes
- Johannes Buchmann
- , Erik Dahmen
- , Michael SzydloAffiliated withAkamai Technologies
Digital signatures have become a key technology for making the Internet and other IT-infrastructures secure. Digital signatures provide authenticity, integrity, and non-repudiation of data. Digital signatures are widely used in identification and authentication protocols. Therefore, the existence of secure digital signature algorithms is crucial for maintaining IT-security.
The digital signature algorithms that are used in practice today are RSA , DSA , and ECDSA . They are not quantum immune since their security relies on the difficulty of factoring large composite integers and computing discrete logarithms.
- Hash-based Digital Signature Schemes
- Book Title
- Post-Quantum Cryptography
- pp 35-93
- Print ISBN
- Online ISBN
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Industry Sectors
- eBook Packages
- Editor Affiliations
- 1. Department of Computer Science, University of Illinois, Chicago
- 2. Department of Computer Science, Technische Universität Darmstadt
- Author Affiliations
- 3. Akamai Technologies, Cambridge
To view the rest of this content please follow the download PDF link above.