TY - GEN
T1 - Hash-based signatures for the internet of things
AU - Palmieri, Paolo
N1 - Publisher Copyright:
© 2018 Association for Computing Machinery.
PY - 2018/5/8
Y1 - 2018/5/8
N2 - While numerous digital signature schemes exist in the literature, most real-world system rely on RSA-based signature schemes or on the digital signature algorithm (DSA), including its elliptic curve cryptography variant ECDSA. In this position paper we review a family of alternative signature schemes, based on hash functions, and we make the case for their application in Internet of Things (IoT) settings. Hash-based signatures provide postquantum security, and only make minimal security assumptions, in general requiring only a secure cryptographic hash function. This makes them extremely exible, as they can be implemented on top of any hash function that satisfies basic security properties. Hash-based signatures also feature numerous parameters defining aspects such as signing speed and key size, that enable trade-offs in constrained environments. Simplicity of implementation and customization make hash based signatures an attractive candidate for the IoT ecosystem, which is composed of a number of diverse, constrained devices.
AB - While numerous digital signature schemes exist in the literature, most real-world system rely on RSA-based signature schemes or on the digital signature algorithm (DSA), including its elliptic curve cryptography variant ECDSA. In this position paper we review a family of alternative signature schemes, based on hash functions, and we make the case for their application in Internet of Things (IoT) settings. Hash-based signatures provide postquantum security, and only make minimal security assumptions, in general requiring only a secure cryptographic hash function. This makes them extremely exible, as they can be implemented on top of any hash function that satisfies basic security properties. Hash-based signatures also feature numerous parameters defining aspects such as signing speed and key size, that enable trade-offs in constrained environments. Simplicity of implementation and customization make hash based signatures an attractive candidate for the IoT ecosystem, which is composed of a number of diverse, constrained devices.
KW - Hash-based signatures
KW - Internet of Things
KW - Signature schemes
UR - https://www.scopus.com/pages/publications/85052236421
U2 - 10.1145/3203217.3206427
DO - 10.1145/3203217.3206427
M3 - Conference proceeding
AN - SCOPUS:85052236421
SN - 9781450357616
T3 - 2018 ACM International Conference on Computing Frontiers, CF 2018 - Proceedings
SP - 332
EP - 335
BT - 2018 ACM International Conference on Computing Frontiers, CF 2018 - Proceedings
PB - Association for Computing Machinery, Inc
T2 - 15th ACM International Conference on Computing Frontiers, CF 2018
Y2 - 8 May 2018 through 10 May 2018
ER -