Pushing the limits of one-time signatures

Kemal Bicakci*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Computational and security advantages of one-time signatures come together with their length restrictions. In most applications, one-time signature should be accompanied with one-time public key(s) to enable multiple signing with a single certified public key. This is why most of the time decreasing the size of one-time signature at a cost of larger public key is not what we desire. In this paper, we show the most efficient one-time signature construction proposed so far in the sense that the total length of a signature and a public key is minimized. Requiring heavier offline computation while keeping the online computation cost both for signing and verification not changed, our improvement is a significant result especially for wireless sensor networks. This is because limited battery power puts stringent limitations on message sizes however heavy offline computation is acceptable and can be performed prior to the deployment of the sensor network.

Original languageEnglish
Title of host publicationSIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks
Pages249-257
Number of pages9
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2nd International Conference on Security of Information and Networks, SIN'09 - Famagusta, Cyprus
Duration: 6 Oct 200910 Oct 2009

Publication series

NameSIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks

Conference

Conference2nd International Conference on Security of Information and Networks, SIN'09
Country/TerritoryCyprus
CityFamagusta
Period6/10/0910/10/09

Keywords

  • Authentication
  • Digital signatures
  • Hash collisions
  • One-time signatures
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'Pushing the limits of one-time signatures'. Together they form a unique fingerprint.

Cite this