Skip to main content

CMSS – An Improved Merkle Signature Scheme

  • Conference paper
Progress in Cryptology - INDOCRYPT 2006 (INDOCRYPT 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4329))

Included in the following conference series:

Abstract

The Merkle signature scheme (MSS) is an interesting alternative for well established signature schemes such as RSA, DSA, and ECDSA. The security of MSS only relies on the existence of cryptographically secure hash functions. MSS has a good chance of being quantum computer resistant. In this paper, we propose CMSS, a variant of MSS, with reduced private key size, key pair generation time, and signature generation time. We demonstrate that CMSS is competitive in practice by presenting a highly efficient implementation within the Java Cryptographic Service Provider FlexiProvider. We present extensive experimental results and show that our implementation can for example be used to sign messages in Microsoft Outlook.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellare, M., Miner, S.: A Forward-Secure Digital Signature Scheme. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 431–448. Springer, Heidelberg (1999)

    Google Scholar 

  2. Coronado García, L.C.: On the security and the efficiency of the Merkle signature scheme. Technical Report 2005/192, Cryptology ePrint Archive (2005), Available at: http://eprint.iacr.org/2005/192/

  3. Coronado García, L.C.: Provably Secure and Practical Signature Schemes. PhD thesis, Computer Science Departement, Technical University of Darmstadt (2005), Available at: http://elib.tu-darmstadt.de/diss/000642/

  4. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  5. Dods, C., Smart, N.P., Stam, M.: Hash Based Digital Signature Schemes. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 96–115. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Elgamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  7. The FlexiProvider group at Technische Universität Darmstadt. FlexiProvider, an open source Java Cryptographic Service Provider (2001-2006), Available at: http://www.flexiprovider.de/

  8. The FlexiPKI research group at Technische Universität Darmstadt. The FlexiS/MIME Outlook Plugin (2003), Available at: http://www.informatik.tu-darmstadt.de/TI/FlexiPKI/FlexiSMIME/FlexiSMIME.html

  9. International Telecommunication Union. X.680: Information technology — Abstract Syntax Notation One (ASN.1): Specification of basic notation (2002), Available at: http://www.itu.int/rec/T-REC-X.680/

  10. Sun Microsystems. The Java Cryptography Architecture API Specification & Reference (2002), Available at: http://java.sun.com/j2se/1.4.2/docs/guide/security/CryptoSpec.html

  11. Sun Microsystems. The Java Cryptography Extension (JCE) Reference Guide (2002), Available at: http://java.sun.com/j2se/1.4.2/docs/guide/security/jce/JCERefGuide.html

  12. Johnson, D., Menezes, A.: The Elliptic Curve Digital Signature Algorithm (ECDSA). Technical Report CORR 99-34, University of Waterloo (1999), Available at: http://www.cacr.math.uwaterloo.ca

  13. Merkle, R.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  14. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton, Florida (1996), Available at: http://cacr.math.uwaterloo.ca/hac/

    Book  Google Scholar 

  15. Naor, D., Shenhav, A., Wool, A.: One-Time Signatures Revisited: Have They Become Practical? Technical Report 2005/442, Cryptology ePrint Archive (2005), Available at: http://eprint.iacr.org/2005/442/

  16. Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  17. Shor, P.W.: Algorithms for Quantum Computation: Discrete Logarithms and Factoring. In: Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science (FOCS 1994), pp. 124–134. IEEE Computer Society Press, Los Alamitos (1994)

    Chapter  Google Scholar 

  18. Szydlo, M.: Merkle Tree Traversal in Log Space and Time. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 541–554. Springer, Heidelberg (2004) (preprint version), Available at: http://szydlo.com/

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Buchmann, J., García, L.C.C., Dahmen, E., Döring, M., Klintsevich, E. (2006). CMSS – An Improved Merkle Signature Scheme. In: Barua, R., Lange, T. (eds) Progress in Cryptology - INDOCRYPT 2006. INDOCRYPT 2006. Lecture Notes in Computer Science, vol 4329. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11941378_25

Download citation

  • DOI: https://doi.org/10.1007/11941378_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49767-7

  • Online ISBN: 978-3-540-49769-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics