PARALLEL PROCESSING TECHNIQUES FOR HASH-BASED SIGNATURE ALGORITHMS
First Claim
1. An apparatus, comprising:
- a computer readable memory to store a public key associated with a signing device;
communication logic to receive, from the signing device, a signature chunk which is a component of a signature generated by a hash-based signature algorithm, and at least a first intermediate node value associated with the signature chunk;
verification logic to;
execute a first hash chain beginning with the signature chunk to produce at least a first computed intermediate node value;
execute a second hash chain beginning with the at least one intermediate node value associated with the signature chunk to produce a first computed final node value; and
use the first computed intermediate node value and the first computed final computed node value to validate the signature generated by the hash-based signature algorithm.
1 Assignment
0 Petitions
Accused Products
Abstract
In one example an apparatus comprises a computer readable memory to store a public key associated with a signing device, communication logic to receive, from the signing device, a signature chunk which is a component of a signature generated by a hash-based signature algorithm, and at least a first intermediate node value associated with the signature chunk, verification logic to execute a first hash chain beginning with the signature chunk to produce at least a first computed intermediate node value, execute a second hash chain beginning with the at least one intermediate node value associated with the signature chunk to produce a first computed final node value, and use the first computed intermediate node value and the first computed final computed node value to validate the signature generated by the hash-based signature algorithm. Other examples may be described.
-
Citations
27 Claims
-
1. An apparatus, comprising:
-
a computer readable memory to store a public key associated with a signing device; communication logic to receive, from the signing device, a signature chunk which is a component of a signature generated by a hash-based signature algorithm, and at least a first intermediate node value associated with the signature chunk; verification logic to; execute a first hash chain beginning with the signature chunk to produce at least a first computed intermediate node value; execute a second hash chain beginning with the at least one intermediate node value associated with the signature chunk to produce a first computed final node value; and use the first computed intermediate node value and the first computed final computed node value to validate the signature generated by the hash-based signature algorithm. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-implemented method, comprising:
-
storing a public key associated with a signing device in a computer-readable medium; receiving, from the signing device, a signature chunk which is a component of a signature generated by a hash-based signature algorithm, and at least a first intermediate node value associated with the signature chunk; executing a first hash chain beginning with the signature chunk to produce at least a first computed intermediate node value; executing a second hash chain beginning with the at least one intermediate node value associated with the signature chunk to produce a first computed final node value; and using the first computed intermediate node value and the first computed final computed node value to validate the signature generated by the hash-based signature algorithm. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium comprising instructions which, when executed by a processor, configure the processor to perform operations, comprising:
-
storing a public key associated with a signing device in a computer-readable medium; receiving, from the signing device, a signature chunk which is a component of a signature generated by a hash-based signature algorithm, and at least a first intermediate node value associated with the signature chunk; executing a first hash chain beginning with the signature chunk to produce at least a first computed intermediate node value; executing a second hash chain beginning with the at least one intermediate node value associated with the signature chunk to produce a first computed final node value; and using the first computed intermediate node value and the first computed final computed node value to validate the signature generated by the hash-based signature algorithm. - View Dependent Claims (12, 13, 14)
-
-
16. An apparatus, comprising:
-
a computer readable memory to store a private key associated with a signing device; signature logic to generate a signature using a hash-based signature algorithm and the private key, the signature comprising at least a first signature chunk which is a component of the signature, and at least a first intermediate node value associated with the signature chunk; and communication logic to send the at least a first signature chunk and the at least a first intermediate node value associated with the signature chunk to a verifying device. - View Dependent Claims (15, 17, 18, 19)
-
-
20. A computer-implemented method, comprising:
-
storing a private key associated with a signing device in a computer-readable memory; generating a signature using a hash-based signature algorithm and the private key, the signature comprising at least a first signature chunk which is a component of the signature, and at least a first intermediate node value associated with the signature chunk; and sending the at least a first signature chunk and the at least a first intermediate node value associated with the signature chunk to a verifying device. - View Dependent Claims (21, 22, 23)
-
-
24. A non-transitory computer-readable medium comprising instructions which, when executed by a processor, configure the processor to perform operations, comprising:
-
storing a private key associated with a signing device in a computer-readable memory; generating a signature using a hash-based signature algorithm and the private key, the signature comprising at least a first signature chunk which is a component of the signature, and at least a first intermediate node value associated with the signature chunk; and sending the at least a first signature chunk and the at least a first intermediate node value associated with the signature chunk to a verifying device. - View Dependent Claims (25, 26, 27)
-
Specification