Instantiating Treeless Signature Schemes

The authors study the efficiency of the treeless signature schemes and evaluate their practical performance. They explain how to implement them, e.g., how to realize discrete gaussian sampling and how to instantiate the random oracles. Their software implementation as well as extensive experimental results is presented. In particular, they compare the treeless signature schemes with currently used schemes and other post-quantum signature schemes. As the experimental data shows non-competitiveness, a discussion of possible improvements concludes the paper.

Provided by: Technische Universität Chemnitz Topic: Security Date Added: Feb 2013 Format: PDF

Find By Topic