1999年属什么| 硒酵母胶囊对甲状腺的作用是什么| 焕字五行属什么| 男人眼角有痣代表什么| 能屈能伸是什么生肖| 藜芦是什么| 豆柏是什么| 云肖是什么生肖| 同比和环比是什么意思| 肺心病是什么病| 牙齿遇冷热都痛是什么原因| 也许是什么意思| 厅级干部是什么级别| 世袭制是什么意思| 睡觉出汗多是什么原因| 关爱是什么意思| 脑供血不足用什么药效果最好| 狗狗胰腺炎吃什么药| 血压低会导致什么后果| 上午九点半是什么时辰| 什么是隐私| 逍遥丸配什么治失眠| 木字旁的字与什么有关| 三拜九叩是什么意思| 膝关节置换后最怕什么| 什么的彩虹| 桑黄是什么| 血糖高喝什么稀饭好| 梦见蛇追我是什么预兆| 标准差是什么意思| 岳飞属什么生肖| 5.8是什么星座| 猪头肉是什么意思| 马岱字什么| 前庭功能检查是查什么| 宫腔内稍高回声是什么意思| 为什么鼻子无缘无故流鼻血| 炖牛肉放什么| 肝硬化吃什么食物好| 胃疼买什么药| 猪属什么五行| 美国为什么要打伊拉克| 乌梅是什么| 吃什么东西对肺部好| 丙类药一般是什么药| 检查膀胱挂什么科| vcr是什么意思| 猪肝吃多了有什么坏处| 纯钛对人体有什么好处| 刮痧和拔罐有什么区别| 红什么| 奶粉水解什么意思| 野字五行属什么| 软肋骨炎吃什么药对症| 日加西念什么| 1939年属什么生肖| 身体逐渐消瘦是什么原因| 什么是百慕大三角| 西瓜什么时候种| 夏天煲什么汤好| 黑曜石是什么材质| 火供是什么意思| 南瓜是什么颜色| 男人山根有痣代表什么| 三围是什么| 为什么招蚊子| hcg低有什么补救的办法| 散步有什么好处| 血卡是什么| 牛磺酸是什么东西| 干黄酱是什么酱| 胃病吃什么药最好| 盆腔炎吃什么药最有效| 生物钟是什么| 一喝酒就脸红是什么原因| 减肥能吃什么| 瓜子脸适合什么刘海| 84年属什么生肖| 梦见野猪是什么预兆| 广西属于什么气候| 妇科支原体是什么病| 圆明园是什么时候被烧的| 郎才女貌是什么意思| 91年的羊是什么命| 梦见看病是什么意思| 生命线分叉代表什么| 规培是什么意思| 菊花代表什么象征意义| 摩卡棕是什么颜色| 眉毛少是什么原因| 男人梦见血是什么预兆| 什么叫单反相机| 风疹是什么原因引起的| 老人手抖是什么病的预兆| 喉咙发痒吃什么药| 武汉什么省| 3月30日是什么星座| 什么样的女人招人嫉妒| 流火是什么原因造成的| 舌裂纹是什么原因| 脸上长粉刺是什么原因| 多吃黄瓜有什么好处和坏处| 顽固是什么意思| 2008年出生的属什么| 单身领养孩子需要什么条件| 怀孕时间从什么时候开始算| 补铁吃什么药| 周文王叫什么名字| 梦到坟墓是什么意思| 饱经风霜是什么生肖| 复苏是什么意思| 晟这个字读什么| 枕头发黄是什么原因| 榛子是什么树的果实| 画地为牢是什么意思| 高危行为是什么意思| 当归配什么不上火| 肝肿瘤吃什么食物好| 报考护士资格证需要什么条件| 什么植物吸收甲醛| 什么蛋不能吃脑筋急转弯| 手足口病忌口什么食物| 肾虚什么症状| 为什么血压高| 三醋酯纤维是什么面料| 唐氏筛查临界风险是什么意思| 子宫肌瘤有什么危害| 红眼病有什么症状| 红色配什么颜色好看| 脑梗是什么病| 冬天喝什么茶| 妇科千金片主要治什么| 树莓色是什么颜色| 喉咙有异物感是什么原因| 头孢和阿莫西林有什么区别| 一语惊醒梦中人是什么意思| 瞬息万变什么意思| 一月三日是什么星座| 羊水穿刺是检查什么的| 生命线分叉是什么意思| buds是什么意思| 四肢冰凉是什么原因| 什么是意淫| 郑板桥是什么生肖| 月经量少吃什么排淤血| msm是什么药| 927是什么意思| 经常流鼻血是什么情况| 自渡是什么意思| 猫癣用什么药| 贝字旁与什么有关| bu什么颜色| 欧珑香水什么档次| 7月8号是什么星座| 延字五行属什么| 健康证查什么| 收到是什么意思| 爬山虎是什么茎| 天牛吃什么食物| 中国的国球是什么| 地格是什么意思| 梦见好多老鼠是什么意思| 什么东西有助于睡眠| 大暑是什么意思| 富字五行属什么| 少将相当于地方什么级别| 脸上出油多是什么原因| 纹银是什么意思| 喉咙痛头痛吃什么药| 晚上7点到9点是什么时辰| 什么一现| 颈椎疼吃什么药| 模特是什么意思| 治疗阳痿早泄用什么药| mg是什么元素| 病毒性咳嗽吃什么药好| 什么是前奶什么是后奶| 什么样的人能镇住凶宅| 男占258女占369什么意思| 镜里观花是什么生肖| 手上长小水泡是什么原因| 小狗不能吃什么| 男人跑马是什么意思| 喉咙痛不能吃什么东西| 女人吃什么新陈代谢快| 刮宫是什么意思| 是什么东西| 突然眼睛充血是什么原因引起的| 立普妥是什么药| 什么的小河| 父母都是a型血孩子是什么血型| 子宫肌壁回声不均匀是什么意思| 什么人不适合吃榴莲| 咳嗽可以吃什么食物| 咽喉发炎吃什么药| 如花似玉是什么生肖| 甲状腺低密度结节是什么意思| 肚子胀气吃什么药好得快| 什么样的手相最有福气| 一九六八年属什么生肖| 什么是假声| 冠带什么意思| 什么饮料好喝| 磨砂膏有什么作用| 五谷丰登指什么生肖| 降血脂吃什么| 月经多是什么原因| 每天吃黄瓜有什么好处| 蚂蚁属于什么动物| 月和什么有关| 86年是属什么的| 贴秋膘是什么意思啊| 川流不息什么意思| 怀孕从什么时候开始算起| 巧夺天工什么意思| 空调数显是什么意思| 今天是什么日子老黄历| 跳大神什么意思| 既往史是什么意思| atc是什么意思| 着凉吃什么药| 孕妇甲减是什么原因引起的| 倒立有什么好处| 延年益寿的益是什么意思| 男人味是什么意思| 护理是什么意思| 梅毒病有什么症状| 值机是什么意思| 基础代谢是什么意思| rrl是什么牌子| 头大脸大适合什么发型| 阴毛瘙痒是什么原因| 总是放响屁是什么原因| 杀马特是什么| 月经期间头疼是什么原因| 心梗是什么病| 猪润是什么| 肉桂茶是什么茶| 养神经吃什么食物最好| siri是什么| 拔掉智齿有什么影响| 一什么场面| 虚有其表的意思是什么| 痛经什么原因引起的| 胃疼吃什么饭| ch是什么意思| 空调吹感冒吃什么药| zhr是什么牌子的鞋| 小揪揪什么意思| 县副局长是什么级别| 硬下疳是什么样子| 红薯不能和什么食物一起吃| 男性解脲支原体是什么病| 未扪及是什么意思| c类火灾是指什么| 梦见狗打架是什么意思| 痔疮用什么药| 耳鸣什么原因引起| 心肌酶高吃什么药| 角加斗读什么| 乜贴是什么意思| 胃不好吃什么最养胃| 糖化血红蛋白是查什么的| 结肠ca是什么意思| 百度Jump to content

二、三本大学毕业生面临求职之困"请多给我们点机会"

From Wikipedia, the free encyclopedia
百度   常态化监测覆盖面扩大,各地区各部门每季度网站抽查比例从10%提高到30%;全国累计整合迁移无力维护政府网站2万余个,减幅达46%;清除“山寨”政府网站持续推进……  1月底,各地区、各部门2万多家政府网站首次公布“年检”报告,既有强化监督的《政府网站监管年度报表》,也有深入“自检”的《政府网站工作年度报表》,向全社会亮出政府网站“家底”,进一步推动建设整体联动、高效惠民的网上政府。

In cryptography, a Lamport signature or Lamport one-time signature scheme is a method for constructing a digital signature. Lamport signatures can be built from any cryptographically secure one-way function; usually a cryptographic hash function is used.

Although the potential development of quantum computers threatens the security of many common forms of cryptography such as RSA, it is believed that Lamport signatures with large hash functions would still be secure in that event. Each Lamport key can only be used to sign a single message. However, many Lamport signatures can be handled by one Merkle hash tree, thus a single hash tree key can be used for many messages, making this a fairly efficient digital signature scheme.

The Lamport signature cryptosystem was invented in 1979 and named after its inventor, Leslie Lamport.[1]

Example

[edit]

Alice has a 256-bit cryptographic hash function and some kind of secure random number generator. She wants to create and use a Lamport key pair, that is, a private key and a corresponding public key.

Making the key pair

[edit]

To create the private key Alice uses the random number generator to produce 256 pairs of random numbers (2×256 numbers in total), each number being 256 bits in size, that is, a total of 2×256×256 bits = 128 Kibit in total. This is her private key and she will store it away in a secure place for later use.

To create the public key she hashes each of the 512 random numbers in the private key, thus creating 512 hashes, each 256 bits in size. (Also 128 Kbits in total.) These 512 hashes form her public key, which she will share with the world.

Signing the message

[edit]

Later Alice wants to sign a message. First she hashes the message to a 256-bit hash sum. Then, for each bit in the hash, based on the value of the bit, she picks one number from the corresponding pairs of numbers that make up her private key (i.e., if the bit is 0, the first number is chosen, and if the bit is 1, the second is chosen). This produces a sequence of 256 numbers. As each number is itself 256 bits long the total size of her signature will be 256×256 bits = 65536 bits = 64 Kibit. These (originally randomly picked) numbers are her signature and she publishes them along with the message.

Note that now that Alice's private key is used, it should never be used again. She must destroy the other 256 numbers that she did not use for the signature. Otherwise, each additional signature reusing the private key reduces the security level against adversaries that might later create false signatures from them.[2]

Verifying the signature

[edit]

Then Bob wants to verify Alice's signature of the message. He also hashes the message to get a 256-bit hash sum. Then he uses the bits in the hash sum to pick out 256 of the hashes in Alice's public key. He picks the hashes in the same manner that Alice picked the random numbers for the signature. That is, if the first bit of the message hash is a 0, he picks the first hash in the first pair, and so on.

Then Bob hashes each of the 256 random numbers in Alice's signature. This gives him 256 hashes. If these 256 hashes exactly match the 256 hashes he just picked from Alice's public key then the signature is ok. If not, then the signature is wrong.

Note that prior to Alice publishing the signature of the message, no one else knows the 2×256 random numbers in the private key. Thus, no one else can create the proper list of 256 random numbers for the signature. And after Alice has published the signature, others still do not know the other 256 random numbers and thus can not create signatures that fit other message hashes.

Formal description

[edit]

Below is a short description of how Lamport signatures work, written in mathematical notation. Note that the "message" in this description is a fixed sized block of reasonable size, possibly (but not necessarily) the hash result of an arbitrarily long message being signed.

Keys

[edit]

Let be a positive integer and let be the set of messages. Let be a one-way function.

For and the signer chooses randomly and computes .

The private key, , consists of values . The public key consists of the values .

Signing a message

[edit]

Let be a message.

The signature of the message is

.

Verifying a signature

[edit]

The verifier validates a signature by checking that for all .

In order to forge a message Eve would have to invert the one-way function . This is assumed to be intractable for suitably sized inputs and outputs.

Security parameters

[edit]

The security of Lamport signatures is based on the security of the one-way hash function and the length of its output.

For a hash function that generates an n-bit message digest, the ideal preimage and 2nd preimage resistance on a single hash function invocation implies on the order of 2n operations to find a collision under a classical computing model. According to Grover's algorithm, finding a preimage collision on a single invocation of an ideal hash function is upper bound on O(2n/2) operations under a quantum computing model. In Lamport signatures, each bit of the public key and signature is based on short messages requiring only a single invocation to a hash function.

For each private key yi,j and its corresponding zi,j public key pair, the private key length must be selected so performing a preimage attack on the length of the input is not faster than performing a preimage attack on the length of the output. For example, in a degenerate case, if each private key yi,j element was only 16 bits in length, it is trivial to exhaustively search all 216 possible private key combinations in 216 operations to find a match with the output, irrespective of the message digest length. Therefore, a balanced system design ensures both lengths are approximately equal.

Based on Grover's algorithm, a quantum secure system, the length of the public key elements zi,j, the private key elements yi,j and the signature elements si,j must be no less than 2 times larger than the security rating of the system. That is:

  • An 80-bit secure system uses element lengths of no less than 160 bit;
  • A 128-bit secure system uses element lengths of no less than 256 bit;

However caution should be taken as the idealistic work estimates above assume an ideal (perfect) hash function and are limited to attacks that target only a single preimage at a time. It is known under a conventional computing model that if 23n/5 preimages are searched, the full cost per preimage decreases from 2n/2 to 22n/5.[3] Selecting the optimum element size taking into account the collection of multiple message digests is an open problem. Selection of larger element sizes and stronger hash functions, such as 512-bit elements and SHA-512, ensures greater security margins to manage these unknowns.

Optimisations and variants

[edit]

Lamport's improved variant

[edit]

Lamport's original version (described above) was first published in the 1976 paper "New Directions in Cryptography".[4] Lamport later published an improved approach in 1979.[5]

Both approaches produce a signature that is a list of half of the values in Alice's private key, with Alice then destroying the other (unused) values from that private key. Rather than always publishing exactly one number from each pair of numbers in the private key as in the original version, the improved version may publish both, one, or neither number from any particular pair of numbers in the private key. The extra flexibility supports the same strength of security using a shorter private key (and therefore a shorter public key).

Short private key

[edit]

Instead of creating and storing all the random numbers of the private key, a single key of sufficient size can be stored. (Usually the same size as one of the random numbers in the private key.) The single key can then be used as the seed for a cryptographically secure pseudorandom number generator (CSPRNG) to create all the random numbers in the private key when needed. Note a cryptographically secure hash (or at least whose output is not XORed with the seed) can not be used instead of CSPRNG because signing a message would reveal additional random values from the private key. If the adversary can access the signature before the intended recipients can, then he can forge a signature with a halving of security level for each doubling of the revealed random values from the private key.

In the same manner a single key can be used together with a CSPRNG to create many Lamport keys. Preferably then some kind of post-quantum secure random access CSPRNG should be used. Notably, classic CSPRNG like BBS should not be used.

Short public key

[edit]

A Lamport signature can be combined with a hash list, making it possible to publish only the single top hash instead of all the hashes in the public key. That is, instead of the values . To verify against the single top hash, the signature must include the random numbers and the unused hashes from the hash list of the public key, resulting in signatures of about twice the size. That is, the values for all needs to be included.

The unused hashes do not need to be included in the signature if a cryptographic accumulator is used instead of a hash list.[6]

Short keys and signature

[edit]

Winternitz signature compression reduces the size of the private key and public key by slightly less than a factor of the , and half that factor for the signature. The computation increases by slightly more than a factor of . A cryptographically secure hash suffices instead of the requirement for a CSPRNG.[7]

A hash list could also be employed to shorten the public key to a single value at the expense of doubling the size of the signature as explained in the prior section.

Public key for multiple messages

[edit]

Each Lamport public key can only be used to sign one single message, which means many keys have to be published if many messages are to be signed. But a hash tree can be used on those public keys, publishing the top hash of the hash tree instead. This increases the size of the resulting signature, since a branch of the hash tree has to be included in the signature, but it makes it possible to publish a single hash that then can be used to verify a large number of future signatures.

See also

[edit]

References

[edit]
  1. ^ Lamport, Leslie (October 1979). "Constructing Digital Signatures from a One Way Function". SRI International (CSL-98). Retrieved 17 February 2021.
  2. ^ "Lamport signature: How many signatures are needed to forge a signature?".
  3. ^ Bart Preneel, "Design Principles for Iterated Hash Functions Revised"
  4. ^ Whitfield Diffie and Martin E. Hellman. "New Directions in Cryptography". doi:10.1109/TIT.1976.1055638 1976.
  5. ^ Leslie Lamport. "Constructing Digital Signatures from a One Way Function". October 1979. quote: "This report describes an improvement" -- "My Writings".
  6. ^ "Can one use a Cryptographic Accumulator to efficiently store Lamport public keys without the need of a Merkle Tree?".
  7. ^ "Winternitz one-time signature scheme".

Further reading

[edit]
刘邦和刘备什么关系 o型血容易得什么病 姓姜的男孩起什么名字好 慢性胃炎和浅表性胃炎有什么区别 木圣念什么
二甲医院是什么级别 什么孕妇容易怀脑瘫儿 低压高吃什么中成药 11月有什么节日 是什么词性
滚刀什么意思 豆角和什么一起炒好吃 大便颜色发绿是什么原因 福星贵人是什么意思 瑛字五行属什么
抗战纪念日为什么是9月3日 男人山根有痣代表什么 吃什么能降胆固醇 104岁属什么生肖 破除是什么意思
冠心病吃什么药hcv9jop2ns7r.cn 瞌睡多是什么原因hkuteam.com 每天吃松子有什么好处hcv8jop9ns1r.cn 1月1日是什么节hcv7jop5ns5r.cn 土鳖是什么意思hcv8jop5ns1r.cn
吃什么食物对胰腺好hcv8jop0ns2r.cn 天是什么结构的字hcv8jop5ns9r.cn 梦见辣椒是什么预兆jingluanji.com 甲沟炎是什么引起的hcv7jop5ns0r.cn 打葡萄糖点滴有什么用hcv9jop5ns1r.cn
县公安局局长是什么级别hcv9jop4ns7r.cn 尿常规能查出什么hcv8jop6ns6r.cn 碎花裙配什么鞋子hcv8jop9ns7r.cn 甲状腺滤泡性肿瘤是什么意思hcv7jop6ns6r.cn xswl什么意思hcv7jop6ns5r.cn
脖子上长痘痘什么原因hcv8jop9ns3r.cn special是什么意思hcv9jop4ns1r.cn 科班出身是什么意思hcv8jop7ns2r.cn 蒙蒙的什么hcv9jop0ns0r.cn 咬牙切齿什么意思xscnpatent.com
百度