Poster: Signer Discretion is Advised: On the Insecurity of Vitalik's Threshold Hash-based Signatures
Abstract
References
Index Terms
- Poster: Signer Discretion is Advised: On the Insecurity of Vitalik's Threshold Hash-based Signatures
Recommendations
Quantum-Access Security of Hash-Based Signature Schemes
Information Security and PrivacyAbstractIn post-quantum cryptography, hash-based signature schemes are attractive choices because of the weak assumptions. Most existing hash-based signature schemes are proven secure against post-quantum chosen message attacks (CMAs), where the ...
Hash-based signatures for the internet of things: position paper
CF '18: Proceedings of the 15th ACM International Conference on Computing FrontiersWhile numerous digital signature schemes exist in the literature, most real-world system rely on RSA-based signature schemes or on the digital signature algorithm (DSA), including its elliptic curve cryptography variant ECDSA.
In this position paper we ...
An Intermediate Secret-Guessing Attack on Hash-Based Signatures
Advances in Information and Computer SecurityAbstractDigital signature schemes form the basis of trust in Internet communication. Shor (FOCS 1994) proposed quantum algorithms that can be used by a quantum computer to break the security of today’s widely used digital signature schemes, and this has ...
Comments
Information & Contributors
Information
Published In

- General Chairs:
- Weizhi Meng,
- Christian D. Jensen,
- Program Chairs:
- Cas Cremers,
- Engin Kirda
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 111Total Downloads
- Downloads (Last 12 months)56
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in