Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Tightly security code based two tier signature using chameleon hash functions

View through CrossRef
Abstract The advancement of quantum algorithms threatens traditional digital signatures, prompting the exploration of post-quantum solutions such as code-based signatures with chameleon hash functions. This study investigates the security effectiveness of chameleon hash-based signatures within the hash-and-sign framework, emphasizing their superior resistance to quantum-based attacks. These signatures provide not only non-repudiation and authentication but also possess non-transferable properties, ensuring their validity is confined to a designated verifier without requiring the private key from the public key holder. Furthermore, the non-interactive nature of the proposed scheme preserves efficiency comparable to that of classical schemes, making it a compelling option for quantum-resistant digital signatures. In this paper, we introduce an innovative Kabatianskii-Krouk-Smeets (KKS) scheme over the finite field $\mathbb{F}_{q^m}$, which represents a significant advancement in cryptographic security. A key component of this proposal is the utilization of Chameleon hash functions, which form the foundation of the KKS scheme and operate using both Hamming and rank metrics. These functions are instrumental in constructing digital signature schemes that deliver not only enhanced security but also improved performance, positioning this framework as a strong contender in post-quantum cryptography. To validate the proposed schemes, we carry out a thorough formal analysis of their security properties, confirming their robustness against key compromise and forgery attacks. Additionally, we perform an extensive performance evaluation to illustrate the schemes' efficiency and practical usability in real-world cryptographic applications. We introduce a two-tier signature scheme combining Chameleon hash functions with KKS schemes. This approach uses rank metrics and large finite fields, enhancing security while maintaining system efficiency through the additional protective layers provided by Chameleon hash functions. MSC: 94A60
Springer Science and Business Media LLC
Title: Tightly security code based two tier signature using chameleon hash functions
Description:
Abstract The advancement of quantum algorithms threatens traditional digital signatures, prompting the exploration of post-quantum solutions such as code-based signatures with chameleon hash functions.
This study investigates the security effectiveness of chameleon hash-based signatures within the hash-and-sign framework, emphasizing their superior resistance to quantum-based attacks.
These signatures provide not only non-repudiation and authentication but also possess non-transferable properties, ensuring their validity is confined to a designated verifier without requiring the private key from the public key holder.
Furthermore, the non-interactive nature of the proposed scheme preserves efficiency comparable to that of classical schemes, making it a compelling option for quantum-resistant digital signatures.
In this paper, we introduce an innovative Kabatianskii-Krouk-Smeets (KKS) scheme over the finite field $\mathbb{F}_{q^m}$, which represents a significant advancement in cryptographic security.
A key component of this proposal is the utilization of Chameleon hash functions, which form the foundation of the KKS scheme and operate using both Hamming and rank metrics.
These functions are instrumental in constructing digital signature schemes that deliver not only enhanced security but also improved performance, positioning this framework as a strong contender in post-quantum cryptography.
To validate the proposed schemes, we carry out a thorough formal analysis of their security properties, confirming their robustness against key compromise and forgery attacks.
Additionally, we perform an extensive performance evaluation to illustrate the schemes' efficiency and practical usability in real-world cryptographic applications.
We introduce a two-tier signature scheme combining Chameleon hash functions with KKS schemes.
This approach uses rank metrics and large finite fields, enhancing security while maintaining system efficiency through the additional protective layers provided by Chameleon hash functions.
MSC: 94A60.

Related Results

Enhancing capacity in 5G network by cell tiering
Enhancing capacity in 5G network by cell tiering
The growing reliance on data-centric devices like smartphones, tablets, and notepads has led to a sharp increase in the demand for high-speed mobile data. To address this demand, m...
Building a 256-bit hash function on a stronger MD variant
Building a 256-bit hash function on a stronger MD variant
AbstractCryptographic hash functions are important cryptographic techniques and are used widely in many cryptographic applications and protocols. All the MD4 design based hash func...
Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
Linked List Elimination from Hashing Methods
Linked List Elimination from Hashing Methods
Hashing has been used for decades in many fields such as encryption, password verification, and pattern search. Hash systems consist mainly of three components: the hash function, ...
Alih Kode Dan Campur Kode Dalam Interaksi Masyarakat Terminal Motabuik Kota Atambua
Alih Kode Dan Campur Kode Dalam Interaksi Masyarakat Terminal Motabuik Kota Atambua
This research aims to describe the use of language in community interactions at the Motabuik terminal, Atambua City. The use of language in question is the form and function of cod...
Cash‐based approaches in humanitarian emergencies: a systematic review
Cash‐based approaches in humanitarian emergencies: a systematic review
This Campbell systematic review examines the effectiveness, efficiency and implementation of cash transfers in humanitarian settings. The review summarises evidence from five studi...

Back to Top