2019
DOI: 10.17487/rfc8554
|View full text |Cite
|
Sign up to set email alerts
|

Leighton-Micali Hash-Based Signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
66
0
33

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 70 publications
(99 citation statements)
references
References 0 publications
0
66
0
33
Order By: Relevance
“…Both [1] and [2] define single tree as well as multi-tree variants of their signature schemes. In an instance that involves two levels of trees, as shown in Figure 4, the OTS keys that form the leaves of the top-level tree sign the roots of the trees at the bottom level, and the OTS keys that form the leaves of the bottom-level trees are used to sign the messages.…”
Section: Two-level Treesmentioning
confidence: 99%
See 3 more Smart Citations
“…Both [1] and [2] define single tree as well as multi-tree variants of their signature schemes. In an instance that involves two levels of trees, as shown in Figure 4, the OTS keys that form the leaves of the top-level tree sign the roots of the trees at the bottom level, and the OTS keys that form the leaves of the bottom-level trees are used to sign the messages.…”
Section: Two-level Treesmentioning
confidence: 99%
“…The root of the top-level tree is the public key for the signature scheme. 2 As described in Section 7, the use of two levels of trees can make it easier to distribute OTS keys across multiple cryptographic modules in order to protect against private key loss. A set of OTS keys can be created in one cryptographic module, and the root of the Merkle tree formed from these keys can be published as the public key for the signature scheme.…”
Section: Two-level Treesmentioning
confidence: 99%
See 2 more Smart Citations
“…Our lower bound on inverting hash chains is well suited for these settings and can be used to derive time-space tradeoff proofs of security for these constructions. This is especially relevant as these schemes are being standardized [32,36,43].…”
Section: Figure 1: Sketch Of T/keymentioning
confidence: 99%