WeChat Mini Program
Old Version Features

HBSS: (simple) Hash-Based Stateless Signatures – Hash All the Way to the Rescue!

Cyber Security, Cryptology, and Machine Learning(2023)

Ben-Gurion University of the Negev

Cited 0|Views41
Abstract
One-time signatures (originated by Lamport) and their extensions to many signatures has gained recent momentum with the need for Post-Quantum secure signing since they are essentially based on standard hash (one-way) functions (rather than number theoretic assumptions). Such signatures, to date, have been based on an array of commitments that are de-committed (private key/preimage revealed) only based on bits of a representation of the hashed message signed, and their stateless versions have been based on pseudorandom functions. In this work, a new approach to the above is presented, based on probabilistic “set membership data structure,” which in turn is based on hash functions. A signature based on hash access to a suitably long array, where k hash functions which are independent are used for each message to tag an index in the array. The above access is similar to the access performed in Bloom filters. The resulting signature scheme is stateless and can be tuned to support any given upper-bound number of signatures (by tuning the array’s length). The central idea is that a de-committed array is only partially loaded with de-commitments to be valid, a fact that assures correctness (signed message is validated), soundness (unsigned message is not fully validated), and unforgeability of the signature (an attempt to forge a signature is reduced to decommitment without access to the private key/decommited preimage). Constructions that are based on enhancing a one-time or bounded-message construction (such as the Naor-Yung extension from bounded messages to regular signatures) are valid for the new Hash-Based Stateless Signature (HBSS).
More
Translated text
求助PDF
上传PDF
Bibtex
AI Read Science
AI Summary
AI Summary is the key point extracted automatically understanding the full text of the paper, including the background, methods, results, conclusions, icons and other key content, so that you can get the outline of the paper at a glance.
Example
Background
Key content
Introduction
Methods
Results
Related work
Fund
Key content
  • Pretraining has recently greatly promoted the development of natural language processing (NLP)
  • We show that M6 outperforms the baselines in multimodal downstream tasks, and the large M6 with 10 parameters can reach a better performance
  • We propose a method called M6 that is able to process information of multiple modalities and perform both single-modal and cross-modal understanding and generation
  • The model is scaled to large model with 10 billion parameters with sophisticated deployment, and the 10 -parameter M6-large is the largest pretrained model in Chinese
  • Experimental results show that our proposed M6 outperforms the baseline in a number of downstream tasks concerning both single modality and multiple modalities We will continue the pretraining of extremely large models by increasing data to explore the limit of its performance
Upload PDF to Generate Summary
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn
Chat Paper
Summary is being generated by the instructions you defined