Re: [cryptography] Merkle Signature Scheme is the most secure signature scheme possible for general-purpose use

2010-09-09 Thread Ben Laurie
On 13/06/2010 05:21, Zooko O'Whielacronx wrote: Folks: Regarding earlier discussion on these lists about the difficulty of factoring and post-quantum cryptography and so on, you might be interested in this note that I just posted to the tahoe-dev list: 100-year digital signatures

Re: [cryptography] Merkle Signature Scheme is the most secure signature scheme possible for general-purpose use

2010-09-03 Thread Marsh Ray
On 09/03/2010 03:45 AM, Ben Laurie wrote: That's the whole point - a hash function used on an arbitrary message produces one of its possible outputs. Feed that hash back in and it produces one of a subset of its possible outputs. Each time you do this, you lose a little entropy (I can't

Re: [cryptography] Merkle Signature Scheme is the most secure signature scheme possible for general-purpose use

2010-09-01 Thread Zooko O'Whielacronx
On Wed, Sep 1, 2010 at 2:55 PM, Ben Laurie b...@links.org wrote: Therefore, you would end up hashing your messages with a secure hash function to generate message representatives short enough to sign. Way behind the curve here, but this argument seems incorrect. Merkle signatures rely on

Re: [cryptography] Merkle Signature Scheme is the most secure signature scheme possible for general-purpose use

2010-07-27 Thread Nicolas Williams
On Sat, Jun 12, 2010 at 10:21:51PM -0600, Zooko O'Whielacronx wrote: http://tahoe-lafs.org/pipermail/tahoe-dev/2010-June/004439.html There you ask how the Merkle Signature Scheme depends on collision resistance. The authors of the paper you link to say that signature itself depends only on