gzz-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Gzz-commits] manuscripts/Sigs article.rst


From: Tuomas J. Lukka
Subject: [Gzz-commits] manuscripts/Sigs article.rst
Date: Mon, 19 May 2003 13:54:14 -0400

CVSROOT:        /cvsroot/gzz
Module name:    manuscripts
Changes by:     Tuomas J. Lukka <address@hidden>        03/05/19 13:54:14

Modified files:
        Sigs           : article.rst 

Log message:
        abs

CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/manuscripts/Sigs/article.rst.diff?tr1=1.117&tr2=1.118&r1=text&r2=text

Patches:
Index: manuscripts/Sigs/article.rst
diff -u manuscripts/Sigs/article.rst:1.117 manuscripts/Sigs/article.rst:1.118
--- manuscripts/Sigs/article.rst:1.117  Mon May 19 13:50:32 2003
+++ manuscripts/Sigs/article.rst        Mon May 19 13:54:13 2003
@@ -14,8 +14,10 @@
 Abstract:
 
 - recursive application of one-time signature to sign
-  nodes along a single branch of a tree of deterministically
-  generated pubkeys
+  nodes along a single branch of a tree of 
+  new pubkeys corresponding to privkeys
+  deterministically
+  generated by random oracle from the tree node
 
 - In conjunction with Merkle hash trees, used to generate
   a family of trade-offed schemes whose time and space characteristics
@@ -23,28 +25,31 @@
 
 - good
 
-  - unlimited time
-
-  - hash function strength, no unproven complexity results
-
   - existentially unforgeable in adaptive chosen message attack, 
     even if underlying one-time-signature algorithm isn't
 
-- instance: 
+  - As long as the random oracle, used to generate the new private keys
+    and to implement the one-time signatures, 
+    isn't broken, an exhaustive
+    key search is the only way to break the scheme.
 
-  - Full DS feature set
+  - unlimited time
 
+  - hash function strength, no trapdoor function required
 
-  - XXX KB
+- instance: 
 
-  - XXX hashes to create, XXX hashes to verify
+  - Full DS feature set
+
+  - XXX KB sig, XXX hashes to create, XXX hashes to verify
 
 - probabilistic instance
 
   - with p XXX safe to sign up to XXX docs
 
+  - XXX KB sig, XXX hashes to create, XXX hashes to verify
 
-
+- we discuss applications
 
 Introduction
 ============




reply via email to

[Prev in Thread] Current Thread [Next in Thread]