Abstract
One-time signature (OTS) offer a viable alternative to public key-based digital signatures. OTS security is typically based only on the strength of the underlying one-way function and does not depend on the conjectured difficulty of some mathematical problem. Although many OTS methods have been proposed in the past, no solid foundation exists for judging their efficiency or optimality. This paper develops a methodology for evaluating OTS methods and presents optimal OTS techniques for a single OTS or a tree with many OTS's. These techniques can be used in a seesaw mode to obtain the desired tradeoff between various parameters such as the cost of signature generation and its subsequent verification.
Original language | English |
---|---|
Pages (from-to) | 339-349 |
Number of pages | 11 |
Journal | Computer Networks |
Volume | 43 |
Issue number | 3 |
DOIs | |
Publication status | Published - 22 Oct 2003 |
Externally published | Yes |
Keywords
- Combinatorics
- Digital signature
- Hash function
- On-line/off-line digital signature
- One-time signature