Hash-Based Signatures: XMSS Secret Key Generation Parameters

undefined
Hash-Based Signatures
Johannes Buchmann, Andreas Hülsung
Supported by DFG and DAAD
Part VI:
XMSS Secret Key
 
XMSS Secret Key Generation
 
Parameters: n, h, w, m,
 
l 
 
=
 
l
(w,m)
 
Required:
 
 2
h
 WOTS signature keys
 WOTS signature key: 
l
 random strings in {0,1}
n
 
XMSS secret key generation:
 
 XMSS secret key is random seed in {0,1}
n
 WOTS signature keys generated using PRF
 
 
 
 
 
 
 
 
 
 
 
Secret Key Size: b
XMSS – Secret key
undefined
Hash-Based Signatures
Johannes Buchmann, Andreas Hülsung
Supported by DFG and DAAD
Part VII:
Forward secure variant of XMSS
 
Forward Security
 
Forward Secure Signatures
time
 
c
l
a
s
s
i
c
a
l
 
pk
 
sk
K
e
y
 
g
e
n
.
 
f
o
r
w
a
r
d
 
s
e
c
 
pk
 
sk
 
sk
1
 
sk
2
 
sk
i
 
sk
T
 
t
1
 
t
2
 
t
i
 
t
T
 
XMSS forward secure
Slide Note

|

|

PhD Defense

---------------

Andreas Hülsing

Embed
Share

This content discusses the XMSS secret key generation parameters, including n, h, w, m, and l, required for generating signature keys. It explains the process of generating WOTS signature keys and XMSS secret keys, utilizing random seeds and PRF. The Forward-Secure variant of XMSS and Forward Security in signature schemes are also explored in detail.

  • Hash-Based Signatures
  • XMSS
  • Secret Key Generation
  • Forward Security
  • PRF

Uploaded on Feb 28, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Hash-Based Signatures Johannes Buchmann, Andreas H lsung Supported by DFG and DAAD Part VI: XMSS Secret Key

  2. XMSS Secret Key Generation Parameters: n, h, w, m, l l = ll(w,m) Required: 2hWOTS signature keys WOTS signature key: ll random strings in {0,1}n XMSS secret key generation: XMSS secret key is random seed in {0,1}n WOTS signature keys generated using PRF n n n } 1 , 0 { : F F } 1 , 0 { } 1 , 0 {

  3. XMSS Secret key F F F F F F F F F F F F Secret Key Size: b

  4. Hash-Based Signatures Johannes Buchmann, Andreas H lsung Supported by DFG and DAAD Part VII: Forward secure variant of XMSS

  5. Forward Security

  6. Forward Secure Signatures pk classical sk pk forward sec sk sk1 sk2 skT ski time tT ti t1 t2 Key gen. = : ( , ), Goal Sig j j i

  7. XMSS forward secure F F F F F F F F F F PRG FSPRG FSPRG FSPRG FSPRG FSPRG

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#