Advertisement

A New Approach to Constructing Digital Signature Schemes

(Short Paper)
  • Ahto Buldas
  • Denis Firsov
  • Risto Laanoja
  • Henri Lakk
  • Ahto TruuEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11689)

Abstract

A new hash-based, server-supported digital signature scheme was proposed recently in [7]. We decompose the concept into forward-resistant tags and a generic cryptographic time-stamping service. Based on the decomposition, we propose more tag constructions which allow efficient digital signature schemes with interesting properties to be built. In particular, the new schemes are more suitable for use in personal signing devices, such as smart cards, which are used infrequently. We define the forward-resistant tags formally and prove that (1) the discussed constructs are indeed tags and (2) combining such tags with time-stamping services gives us signature schemes.

References

  1. 1.
    Benaloh, J., de Mare, M.: Efficient broadcast time-stamping. Technical report, Clarkson University (1991)Google Scholar
  2. 2.
    Bernstein, D.J., et al.: SPHINCS: practical stateless hash-based signatures. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 368–397. Springer, Heidelberg (2015).  https://doi.org/10.1007/978-3-662-46800-5_15CrossRefGoogle Scholar
  3. 3.
    Buchmann, J., Dahmen, E., Hülsing, A.: XMSS - a practical forward secure signature scheme based on minimal security assumptions. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 117–129. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-25405-5_8CrossRefGoogle Scholar
  4. 4.
    Buldas, A., Firsov, D., Laanoja, R., Lakk, H., Truu, A.: A new approach to constructing digital signature schemes (extended paper). Cryptology ePrint Archive, Report 2019/673 (2019). https://eprint.iacr.org/2019/673
  5. 5.
    Buldas, A., Kroonmaa, A., Laanoja, R.: Keyless signatures’ infrastructure: how to build global distributed hash-trees. In: Riis Nielson, H., Gollmann, D. (eds.) NordSec 2013. LNCS, vol. 8208, pp. 313–320. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-41488-6_21CrossRefGoogle Scholar
  6. 6.
    Buldas, A., Laanoja, R., Laud, P., Truu, A.: Bounded pre-image awareness and the security of hash-tree keyless signatures. In: Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.) ProvSec 2014. LNCS, vol. 8782, pp. 130–145. Springer, Cham (2014).  https://doi.org/10.1007/978-3-319-12475-9_10CrossRefzbMATHGoogle Scholar
  7. 7.
    Buldas, A., Laanoja, R., Truu, A.: A server-assisted hash-based signature scheme. In: Lipmaa, H., Mitrokotsa, A., Matulevičius, R. (eds.) NordSec 2017. LNCS, vol. 10674, pp. 3–17. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-70290-2_1CrossRefGoogle Scholar
  8. 8.
    Buldas, A., Saarepera, M.: On provably secure time-stamping schemes. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 500–514. Springer, Heidelberg (2004).  https://doi.org/10.1007/978-3-540-30539-2_35CrossRefGoogle Scholar
  9. 9.
    Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)MathSciNetCrossRefGoogle Scholar
  10. 10.
    European Commission: Regulation no 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing directive 1999/93/EC (eIDAS regulation). Official Journal of the European Union L 257, 73–114 (2014)Google Scholar
  11. 11.
    Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281–308 (1988)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Haber, S., Stornetta, W.S.: How to time-stamp a digital document. J. Cryptol. 3(2), 99–111 (1991)CrossRefGoogle Scholar
  13. 13.
    Merkle, R.C.: Secrecy, authentication and public key systems. Ph.D. thesis, Stanford University (1979)Google Scholar
  14. 14.
    Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988).  https://doi.org/10.1007/3-540-48184-2_32CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Ahto Buldas
    • 1
  • Denis Firsov
    • 1
    • 2
  • Risto Laanoja
    • 1
    • 2
  • Henri Lakk
    • 2
  • Ahto Truu
    • 1
    • 2
    Email author
  1. 1.Tallinn University of TechnologyTallinnEstonia
  2. 2.Guardtime ASTallinnEstonia

Personalised recommendations