Skip to main navigation Skip to search Skip to main content

Hash-based signatures for the internet of things

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

While numerous digital signature schemes exist in the literature, most real-world system rely on RSA-based signature schemes or on the digital signature algorithm (DSA), including its elliptic curve cryptography variant ECDSA. In this position paper we review a family of alternative signature schemes, based on hash functions, and we make the case for their application in Internet of Things (IoT) settings. Hash-based signatures provide postquantum security, and only make minimal security assumptions, in general requiring only a secure cryptographic hash function. This makes them extremely exible, as they can be implemented on top of any hash function that satisfies basic security properties. Hash-based signatures also feature numerous parameters defining aspects such as signing speed and key size, that enable trade-offs in constrained environments. Simplicity of implementation and customization make hash based signatures an attractive candidate for the IoT ecosystem, which is composed of a number of diverse, constrained devices.

Original languageEnglish
Title of host publication2018 ACM International Conference on Computing Frontiers, CF 2018 - Proceedings
PublisherAssociation for Computing Machinery, Inc
Pages332-335
Number of pages4
ISBN (Print)9781450357616
DOIs
Publication statusPublished - 8 May 2018
Event15th ACM International Conference on Computing Frontiers, CF 2018 - Ischia, Italy
Duration: 8 May 201810 May 2018

Publication series

Name2018 ACM International Conference on Computing Frontiers, CF 2018 - Proceedings

Conference

Conference15th ACM International Conference on Computing Frontiers, CF 2018
Country/TerritoryItaly
CityIschia
Period8/05/1810/05/18

Keywords

  • Hash-based signatures
  • Internet of Things
  • Signature schemes

Fingerprint

Dive into the research topics of 'Hash-based signatures for the internet of things'. Together they form a unique fingerprint.

Cite this