Hash-based Digital Signature Schemes
msra(2009)
摘要
Digital signatures have become a key technology for making the Internet and other IT-infrastructures secure. Digital signatures
provide authenticity, integrity, and non-repudiation of data. Digital signatures are widely used in identification and authentication
protocols. Therefore, the existence of secure digital signature algorithms is crucial for maintaining IT-security.
The digital signature algorithms that are used in practice today are RSA [31], DSA [11], and ECDSA [15]. They are not quantum
immune since their security relies on the difficulty of factoring large composite integers and computing discrete logarithms.
更多查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要