MiniPASS: Authentication and Digital Signatures in a Constrained Environment

We describe an implementation of the PASS polynomial authentication and signature scheme [5,6] that is suitable for use in highly constrained environments such as smart cards and wireless applications. The algorithm underlying the PASS scheme, as described in [5,6], already features high speed and a small footprint, and these are further enhanced by transferring computational overhead to the server to the extent possible. We also describe timing and footprint results from a prototype implementation.

[1]  Joseph H. Silverman,et al.  Polynomial Rings and Efficient Public Key Authentication II , 2001 .

[2]  Tatsuaki Okamoto,et al.  Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.

[3]  Oded Goldreich,et al.  Public-Key Cryptosystems from Lattice Reduction Problems , 1996, CRYPTO.

[4]  Joseph H. Silverman,et al.  NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.

[5]  Jean-Jacques Quisquater,et al.  A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.

[6]  Michael Rosing,et al.  Implementing elliptic curve cryptography , 1998 .

[7]  Joseph H. Silverman Lattices, cryptography, and the NTRU public key cryptosystem , 2000, Unusual Applications of Number Theory.

[8]  Jacques Stern,et al.  A New Identification Scheme Based on Syndrome Decoding , 1993, CRYPTO.

[9]  Jacques Stern,et al.  Lattices and Cryptography: An Overview , 1998, Public Key Cryptography.

[10]  Claus-Peter Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.

[11]  O. Goldreich Public-key cryptography from lattice reduction problems , 1997, CRYPTO 1997.

[12]  Ernest F. Brickell,et al.  Interactive identification and digital signatures , 1991, AT&T Technical Journal.

[13]  Cynthia Dwork,et al.  A public-key cryptosystem with worst-case/average-case equivalence , 1997, STOC '97.

[14]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[15]  Jacques Stern,et al.  Designing Identification Schemes with Keys of Short Size , 1994, CRYPTO.

[16]  C. P. Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.

[17]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .