Post quantum hash based digital signatures comparative analysis. Features of their implementation and using in public key infrastructure
Title | Post quantum hash based digital signatures comparative analysis. Features of their implementation and using in public key infrastructure |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Potii, O., Gorbenko, Y., Isirova, K. |
Conference Name | 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S T) |
Keywords | Computer science, cybernetics, digital signatures, Hash based digital signatures, hash functions analysis, Leighton-Micali algorithm, Merkle algorithm, perspective digital signatures algorithms, post quantum cryptography, post quantum hash based digital signatures, pubcrawl, Public key, public key cryptography, public key infrastructure, Quantum-safe digital signatures, resilience, Scalability, SPHINCS algorithm, System analysis and design, Telecommunications, Ukrainian hash function national standard, XMSS algorithm, XMSS algorithm implementation |
Abstract | The paper contains the results of perspective digital signatures algorithms based on hash functions analysis. Several aspects of their implementation are presented. The comparative analysis was carried out by the method of hierarchies. Some problems of implementation in the existing infrastructure are described. XMSS algorithm implementation with Ukrainian hash function national standard is presented. |
URL | https://ieeexplore.ieee.org/document/8246360 |
DOI | 10.1109/INFOCOMMST.2017.8246360 |
Citation Key | potii_post_2017 |
- Public key
- XMSS algorithm implementation
- XMSS algorithm
- Ukrainian hash function national standard
- Telecommunications
- system analysis and design
- SPHINCS algorithm
- Scalability
- resilience
- Quantum-safe digital signatures
- public key infrastructure
- public key cryptography
- computer science
- pubcrawl
- post quantum hash based digital signatures
- post quantum cryptography
- perspective digital signatures algorithms
- Merkle algorithm
- Leighton-Micali algorithm
- hash functions analysis
- Hash based digital signatures
- digital signatures
- cybernetics