• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

K-XMSS和K-SPHINCS:使用韩国加密算法的基于哈希签名增强下一代移动通信和互联网系统的安全性。

K-XMSS and K-SPHINCS: Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms.

作者信息

Sim Minjoo, Eum Siwoo, Song Gyeongju, Yang Yujin, Kim Wonwoong, Seo Hwajeong

机构信息

Department of Information Computer Engineering, Hansung University, Seoul 02876, Republic of Korea.

Department of Convergence Security, Hansung University, Seoul 02876, Republic of Korea.

出版信息

Sensors (Basel). 2023 Aug 31;23(17):7558. doi: 10.3390/s23177558.

DOI:10.3390/s23177558
PMID:37688014
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10490732/
Abstract

As Mobile Communication and Internet Systems (MCIS) have rapidly developed, security issues related to MCIS have become increasingly important. Therefore, the development and research of security technologies for mobile communication and internet systems are actively being conducted. Hash-Based Signature (HBS) uses a hash function to construct a digital signature scheme, where its security is guaranteed by the collision resistance of the hash function used. To provide sufficient security in the post-quantum environment, the length of hash should be satisfied for the security requirement. Modern HBS can be classified into stateful and stateless schemes. Two representative stateful and stateless HBS are eXtended Merkle Signature Scheme(XMSS) and SPHINCS+, respectively. In this paper, we propose two HBS schemes: K-XMSS and K-SPHINCS+, which replace internal hash functions of XMSS and SPHINCS+ with Korean cryptography algorithms. K-XMSS is a stateful signature, while K-SPHINCS+ is its stateless counterpart. We showcase the reference implementation of K-XMSS and K-SPHINCS+ employing Lightweight Secure Hash (LSH) and two hash functions based on block ciphers (i.e., CHAM and LEA) as the internal hash function. In addition, K-XMSS and K-SPHINCS+ using Advanced Vector Extensions 2 (AVX2) have been provided, demonstrating that they can be optimized for better performance using advanced implementation techniques than previous approaches.

摘要

随着移动通信和互联网系统(MCIS)的迅速发展,与MCIS相关的安全问题变得越来越重要。因此,针对移动通信和互联网系统的安全技术的开发和研究正在积极开展。基于哈希的签名(HBS)使用哈希函数来构建数字签名方案,其安全性由所使用的哈希函数的抗碰撞性来保证。为了在后量子环境中提供足够的安全性,哈希的长度应满足安全要求。现代HBS可分为有状态和无状态方案。两种具有代表性的有状态和无状态HBS分别是扩展默克尔签名方案(XMSS)和SPHINCS+。在本文中,我们提出了两种HBS方案:K-XMSS和K-SPHINCS+,它们用韩国密码算法替换了XMSS和SPHINCS+的内部哈希函数。K-XMSS是一种有状态签名,而K-SPHINCS+是其无状态对应物。我们展示了K-XMSS和K-SPHINCS+的参考实现,采用轻量级安全哈希(LSH)以及基于分组密码的两种哈希函数(即CHAM和LEA)作为内部哈希函数。此外,还提供了使用高级向量扩展2(AVX2)的K-XMSS和K-SPHINCS+,表明与以前的方法相比,它们可以使用先进的实现技术进行优化以获得更好的性能。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1537/10490732/bd3d102a9515/sensors-23-07558-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1537/10490732/0a7ed1f9a3b2/sensors-23-07558-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1537/10490732/987f69f54cde/sensors-23-07558-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1537/10490732/93ab41f00433/sensors-23-07558-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1537/10490732/7098ce7029b4/sensors-23-07558-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1537/10490732/4e8508881f75/sensors-23-07558-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1537/10490732/bd3d102a9515/sensors-23-07558-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1537/10490732/0a7ed1f9a3b2/sensors-23-07558-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1537/10490732/987f69f54cde/sensors-23-07558-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1537/10490732/93ab41f00433/sensors-23-07558-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1537/10490732/7098ce7029b4/sensors-23-07558-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1537/10490732/4e8508881f75/sensors-23-07558-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1537/10490732/bd3d102a9515/sensors-23-07558-g006.jpg

相似文献

1
K-XMSS and K-SPHINCS: Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms.K-XMSS和K-SPHINCS:使用韩国加密算法的基于哈希签名增强下一代移动通信和互联网系统的安全性。
Sensors (Basel). 2023 Aug 31;23(17):7558. doi: 10.3390/s23177558.
2
A Hash-Based Quantum-Resistant Chameleon Signature Scheme.基于哈希的量子抗性变色龙签名方案。
Sensors (Basel). 2021 Dec 16;21(24):8417. doi: 10.3390/s21248417.
3
An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things.基于物联网的门限哈希函数的聚合签名方案
Sensors (Basel). 2019 Sep 29;19(19):4239. doi: 10.3390/s19194239.
4
Improved 2-round collision attack on IoT hash standard ASCON-HASH.对物联网哈希标准ASCON-HASH的改进型两轮碰撞攻击。
Heliyon. 2024 Feb 13;10(5):e26119. doi: 10.1016/j.heliyon.2024.e26119. eCollection 2024 Mar 15.
5
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander.密钥派生函数:基于密钥哈希的计算提取器和基于流的伪随机扩展器。
PeerJ Comput Sci. 2024 Aug 23;10:e2249. doi: 10.7717/peerj-cs.2249. eCollection 2024.
6
Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge.哈希链雾/边缘:一种基于模式的哈希链,用于在雾/边缘中使用零知识证明的安全相互认证协议。
Sensors (Basel). 2022 Jan 13;22(2):607. doi: 10.3390/s22020607.
7
VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV.VASERP:一种用于车联网的自适应、轻量级、安全且高效的基于 RFID 的认证方案。
Sensors (Basel). 2023 May 30;23(11):5198. doi: 10.3390/s23115198.
8
Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices.面向物联网设备安全保障的面积和能量高效可重构加密加速器的设计与分析。
Sensors (Basel). 2022 Nov 25;22(23):9160. doi: 10.3390/s22239160.
9
An effective and secure key-management scheme for hierarchical access control in E-medicine system.一种用于电子医疗系统中分层访问控制的有效且安全的密钥管理方案。
J Med Syst. 2013 Apr;37(2):9920. doi: 10.1007/s10916-012-9920-5. Epub 2013 Feb 8.
10
Quantum hash function based on controlled alternate lively quantum walks.基于受控交替活跃量子行走的量子哈希函数。
Sci Rep. 2023 Apr 11;13(1):5887. doi: 10.1038/s41598-023-33119-w.