TY - GEN
T1 - Efficient unconditionally secure signatures using universal hashing
AU - Amiri, Ryan
AU - Abidin, Aysajan
AU - Wallden, Petros
AU - Andersson, Erika
PY - 2018/6/10
Y1 - 2018/6/10
N2 - Digital signatures are one of the most important cryptographic primitives. In this work we construct an information-theoretically secure signature scheme which, unlike prior schemes, enjoys a number of advantageous properties such as short signature length and high generation efficiency, to name two. In particular, we extend symmetric-key message authentication codes (MACs) based on universal hashing to make them transferable, a property absent from traditional MAC schemes. Our main results are summarised as follows. We construct an unconditionally secure signature scheme which, unlike prior schemes, does not rely on a trusted third party or anonymous channels.We prove information-theoretic security of our scheme against forging, repudiation, and non-transferability.We compare our scheme with existing both “classical” (not employing quantum mechanics) and quantum unconditionally secure signature schemes. The comparison shows that our new scheme, despite requiring fewer resources, is much more efficient than all previous schemes.Finally, although our scheme does not rely on trusted third parties, we discuss this, showing that having a trusted third party makes our scheme even more attractive.
AB - Digital signatures are one of the most important cryptographic primitives. In this work we construct an information-theoretically secure signature scheme which, unlike prior schemes, enjoys a number of advantageous properties such as short signature length and high generation efficiency, to name two. In particular, we extend symmetric-key message authentication codes (MACs) based on universal hashing to make them transferable, a property absent from traditional MAC schemes. Our main results are summarised as follows. We construct an unconditionally secure signature scheme which, unlike prior schemes, does not rely on a trusted third party or anonymous channels.We prove information-theoretic security of our scheme against forging, repudiation, and non-transferability.We compare our scheme with existing both “classical” (not employing quantum mechanics) and quantum unconditionally secure signature schemes. The comparison shows that our new scheme, despite requiring fewer resources, is much more efficient than all previous schemes.Finally, although our scheme does not rely on trusted third parties, we discuss this, showing that having a trusted third party makes our scheme even more attractive.
KW - Digital signatures
KW - Information-theoretic security
KW - Transferable MAC
KW - Universal hashing
UR - http://www.scopus.com/inward/record.url?scp=85049102319&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-93387-0_8
DO - 10.1007/978-3-319-93387-0_8
M3 - Conference contribution
AN - SCOPUS:85049102319
SN - 9783319933863
T3 - Lecture Notes in Computer Science
SP - 143
EP - 162
BT - Applied Cryptography and Network Security
A2 - Preneel, Bart
A2 - Vercauteren, Frederik
PB - Springer
T2 - 16th International Conference on Applied Cryptography and Network Security 2018
Y2 - 2 July 2018 through 4 July 2018
ER -