Skip to main content
Log in

Merkle tree digital signature and trusted computing platform

  • Trusted Software
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signature scheme is constructed, and it is provably existentially unforgeable under adaptive chosen message attack. By decentralizing the initial key generation process of the original scheme within the signature process, a large Merkle tree with 6. 87×1010 possible signatures can be initialized in 590 milliseconds. Storing some small Merkle trees in hard disk and memory can speed up Merkle tree signature scheme. Mekle tree signature schemes are fit for trusted computing platform in most scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Merkle R.Secrecy. Authentication, and Public Key Systems [M].Ann Arbor:UMI Research Press, 1982.

    Google Scholar 

  2. Merkle R. A Digital Signature Based on a Conventional Encryption Function[C] //Proc. CRYPTO87, Lecture Notes in Computer Science 293. Berlin: Springer-Verlag, 1988: 369–378.

    Google Scholar 

  3. Williams D, Sirer E G. Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees [C]//Proceedings of the Third IEEE International Symposium on Network Computing and Applications. Los Alamitos: IEEE Computer Society, 2004:383–388.

    Google Scholar 

  4. Naor D, Shenhavy A, Woolz A. One-Time Signatures Revisited: Have They Become Practical[EB/OL]. [2005-11-02].http://eprint.iacr.org/2005/442.pdf.

  5. Trusted Computing Group. TCG Specification Architecture Overview, Revisionl. 2 [EB/OL]. [2005-11-02].https://www.trustedcomputinggroup. org/groups/TCG_1_0_Architecture_Overview.pdf.

  6. Bicakci K, Tsudik G, Tung B. How to Construct Optimal One-Time Signatures[J].Computer Networks (Elsevier), 2003,43(3):339–349.

    Article  MATH  Google Scholar 

  7. Bleichenbacher D, Maurer U M. Optimal Tree-Based One Time Digital Signature Schemes [C]//STACS'96 Lecture Notes in Computer Science 1046. Berlin: Springer-Verlag, 1996:363–374.

    Google Scholar 

  8. Jakobsson M, Leighton T, Micali S,et al. Fractal Merkle Tree Representation and Traversal [C]//Proceedings of RSA-CT'03, Lecture Notes in Computer Science 2612. Berlin: Springer-Verlag, 2003: 314–326.

    Google Scholar 

  9. Boneh D, Mironov I, Shoup V. A Secure Signature Scheme from Bilinear Maps[C] //Proceedings of RSA-CT'03, Lecture Notes in Computer Science 2612. Berlin: Springer-Verlag, 2003:98–110.

    Google Scholar 

  10. Goldwasser S, Micali S, Rivest R. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks [J].Siam Journal on Computing, 1988,17(2):281–308.

    Article  MATH  MathSciNet  Google Scholar 

  11. Coluccio D. Implementation of a Hash-Based Digital Signature Scheme Using Fractal Merkle Tree Representation [EB/OL]. [2005-11-06].http://csl.cs.nyu.edu/~dfc218/hashsig.html.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hong Fan.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60403027)

Biography: WANG Xiaofei (1957-), male, Ph. D. candidate, research direction: information security, cryptographic algorithm.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Xiaofei, W., Fan, H., Xueming, T. et al. Merkle tree digital signature and trusted computing platform. Wuhan Univ. J. Nat. Sci. 11, 1467–1472 (2006). https://doi.org/10.1007/BF02831799

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831799

Key words

CLC number

Navigation