A New Approach to Constructing Digital Signature Schemes
A new hash-based, server-supported digital signature scheme was proposed recently in . We decompose the concept into forward-resistant tags and a generic cryptographic time-stamping service. Based on the decomposition, we propose more tag constructions which allow efficient digital signature schemes with interesting properties to be built. In particular, the new schemes are more suitable for use in personal signing devices, such as smart cards, which are used infrequently. We define the forward-resistant tags formally and prove that (1) the discussed constructs are indeed tags and (2) combining such tags with time-stamping services gives us signature schemes.
- 1.Benaloh, J., de Mare, M.: Efficient broadcast time-stamping. Technical report, Clarkson University (1991)Google Scholar
- 4.Buldas, A., Firsov, D., Laanoja, R., Lakk, H., Truu, A.: A new approach to constructing digital signature schemes (extended paper). Cryptology ePrint Archive, Report 2019/673 (2019). https://eprint.iacr.org/2019/673
- 5.Buldas, A., Kroonmaa, A., Laanoja, R.: Keyless signatures’ infrastructure: how to build global distributed hash-trees. In: Riis Nielson, H., Gollmann, D. (eds.) NordSec 2013. LNCS, vol. 8208, pp. 313–320. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41488-6_21CrossRefGoogle Scholar
- 6.Buldas, A., Laanoja, R., Laud, P., Truu, A.: Bounded pre-image awareness and the security of hash-tree keyless signatures. In: Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.) ProvSec 2014. LNCS, vol. 8782, pp. 130–145. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-12475-9_10CrossRefzbMATHGoogle Scholar
- 10.European Commission: Regulation no 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing directive 1999/93/EC (eIDAS regulation). Official Journal of the European Union L 257, 73–114 (2014)Google Scholar
- 13.Merkle, R.C.: Secrecy, authentication and public key systems. Ph.D. thesis, Stanford University (1979)Google Scholar