Post-Quantum Cryptography

pp 35-93

Hash-based Digital Signature Schemes

  • Johannes Buchmann
  • , Erik Dahmen
  • , Michael SzydloAffiliated withAkamai Technologies

* Final gross prices may vary according to local VAT.

Get Access

Digital signatures have become a key technology for making the Internet and other IT-infrastructures secure. Digital signatures provide authenticity, integrity, and non-repudiation of data. Digital signatures are widely used in identification and authentication protocols. Therefore, the existence of secure digital signature algorithms is crucial for maintaining IT-security.

The digital signature algorithms that are used in practice today are RSA [31], DSA [11], and ECDSA [15]. They are not quantum immune since their security relies on the difficulty of factoring large composite integers and computing discrete logarithms.