FAST XMSS SIGNATURE VERIFICATION AND NONCE SAMPLING PROCESS WITHOUT SIGNATURE EXPANSION
First Claim
1. An apparatus, comprising:
- accelerator logic to pre-compute at least a portion of a message representative;
hash logic to generate the message representative based on an input message; and
signature logic to;
generate a signature to be transmitted in association with the message representative, the signature logic to apply a hash-based signature scheme to a private key to generate the signature comprising a public key; and
determine whether the message representative satisfies a target threshold allocation of computational costs between a cost to generate the signature and a cost to verify the signature.
1 Assignment
0 Petitions
Accused Products
Abstract
In one example an apparatus comprises accelerator logic to pre-compute at least a portion of a message representative, hash logic to generate the message representative based on an input message, and signature logic to generate a signature to be transmitted in association with the message representative, the signature logic to apply a hash-based signature scheme to a private key to generate the signature comprising a public key, and determine whether the message representative satisfies a target threshold allocation of computational costs between a cost to generate the signature and a cost to verify the signature. Other examples may be described.
-
Citations
21 Claims
-
1. An apparatus, comprising:
-
accelerator logic to pre-compute at least a portion of a message representative; hash logic to generate the message representative based on an input message; and signature logic to; generate a signature to be transmitted in association with the message representative, the signature logic to apply a hash-based signature scheme to a private key to generate the signature comprising a public key; and determine whether the message representative satisfies a target threshold allocation of computational costs between a cost to generate the signature and a cost to verify the signature. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method, comprising:
-
pre-computing at least a portion of a message representative; generating the message representative based on an input message; generating a signature to be transmitted in association with the message representative, the signature logic to apply a hash-based signature scheme to a private key to generate the signature comprising a public key; and determining whether the message representative satisfies a target threshold allocation of computational costs between a cost to generate the signature and a cost to verify the signature. - View Dependent Claims (9, 10, 11, 12, 14)
-
-
15. A non-transitory computer-readable medium comprising instructions which, when executed by a processor, configure the processor to perform operations, comprising:
pre-computing at least a portion of a message representative; generating the message representative based on an input message; generating a signature to be transmitted in association with the message representative, the signature logic to apply a hash-based signature scheme to a private key to generate the signature comprising a public key; and determining whether the message representative satisfies a target threshold allocation of computational costs between a cost to generate the signature and a cost to verify the signature - View Dependent Claims (13, 16, 17, 18, 19, 20, 21)
Specification