In
hash-based cryptography, the Merkle signature scheme is a
digital signature scheme
A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very high confidence that the message was created b ...
based on
Merkle trees (also called hash trees) and one-time signatures such as the
Lamport signature scheme. It was developed by
Ralph Merkle
Ralph C. Merkle (born February 2, 1952) is a computer scientist and mathematician. He is one of the inventors of public-key cryptography, the inventor of cryptographic hashing, and more recently a researcher and speaker on cryonics.
Contribution ...
in the late 1970s and is an alternative to traditional digital signatures such as the
Digital Signature Algorithm
The Digital Signature Algorithm (DSA) is a public-key cryptosystem and Federal Information Processing Standard for digital signatures, based on the mathematical concept of modular exponentiation and the discrete logarithm problem. DSA is a varia ...
or
RSA
RSA may refer to:
Organizations Academia and education
* Rabbinical Seminary of America, a yeshiva in New York City
*Regional Science Association International (formerly the Regional Science Association), a US-based learned society
*Renaissance S ...
.
NIST
The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into physical sc ...
has approved specific variants of the Merkle signature scheme in 2020.
An advantage of the Merkle signature scheme is that it is believed to be resistant against attacks by
quantum computers
Quantum computing is a type of computation whose operations can harness the phenomena of quantum mechanics, such as superposition, interference, and entanglement. Devices that perform quantum computations are known as quantum computers. Though ...
. The traditional
public key
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic a ...
algorithms, such as RSA and
ElGamal
In cryptography, the ElGamal encryption system is an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie–Hellman key exchange. It was described by Taher Elgamal in 1985. ElGamal encryption is used in t ...
would become insecure if an effective quantum computer could be built (due to
Shor's algorithm
Shor's algorithm is a quantum computer algorithm for finding the prime factors of an integer. It was developed in 1994 by the American mathematician Peter Shor.
On a quantum computer, to factor an integer N , Shor's algorithm runs in polynomial ...
). The Merkle signature scheme, however, only depends on the existence of secure
hash function
A hash function is any function that can be used to map data of arbitrary size to fixed-size values. The values returned by a hash function are called ''hash values'', ''hash codes'', ''digests'', or simply ''hashes''. The values are usually ...
s. This makes the Merkle signature scheme very adjustable and resistant to quantum computer-based attacks. The Merkle signature is a ''one time signature'' with finite signing potential. The work of
Moni Naor and
Moti Yung
Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography.
Career
Yung earned his PhD from Columbia University in 1988 under the supervision of Zvi Galil. In the past, he worked at t ...
on signature based
one-way permutations and functions (and the invention of
universal one-way hash functions) gives a way to extend a Merkle-like signature to a complete signature scheme.
Key generation
The Merkle signature scheme can be used to sign a limited number of messages with one public key
. The number of possible messages must be a power of two, so we denote the possible number of messages as
.
The first step of generating the public key
is to generate
private/public key pairs
of some one-time signature scheme (such as the Lamport signature scheme). For each
, a hash value of the public key
is computed.
With these hash values
a
hash tree is built, by placing these
hash values as leaves and recursively hashing to form a binary tree. Let
denote the node in the tree with height
and left-right position
. Then, the hash values
are the leaves. The value for each inner node of the tree is the hash of the concatenation of its two children. For example,
and
. In this way, a tree with
leaves and
nodes is built.
The private key of the Merkle signature scheme is the entire set of
pairs. A shortcoming with the scheme is that the size of the private key scales linearly with the number of messages to be sent.
The public key
is the root of the tree,
. The individual public keys
can be made public without breaking security. However, they are not needed in the public key, so they can be kept secret to minimize the size of the public key.
Signature generation
To sign a message
with the Merkle signature scheme, the signer picks a key pair
, signs the message using the one-time signature scheme, and then adds additional information to prove that the key pair used was one of the original key pairs (rather than one newly generated by a forger).
First, the signer chooses a
pair which had not previously been used to sign any other message, and uses the one-time signature scheme to sign the message, resulting in a signature
and corresponding public key
. To prove to the message verifier that
was in fact one of the original key pairs, the signer simply includes intermediate nodes of the Merkle tree so that the verifier can verify
was used to compute the public key
at the root of the tree. The path in the hash tree from
to the root is
nodes long. Call the nodes
, with
being a leaf and
being the root.
is a child of
. To let the verifier calculate the next node
given the previous, they need to know the other child of
, the sibling node of
. We call this node
, so that
. Hence,
nodes
are needed, to reconstruct
from
. An example of an authentication path is illustrated in the figure on the right.
Together, the nodes
, the
, and the one-time signature
constitute a signature of
using the Merkle signature scheme:
.
Note that when using the Lamport signature scheme as the one-time signature scheme,
contains a part of the private key
.
Signature verification
The receiver knows the public key
, the message
, and the signature
. First, the receiver verifies the one-time signature
of the message
using the one-time signature public key
. If
is a valid signature of
, the receiver computes
by hashing the public key of the one-time signature. For
, the nodes of
of the path are computed with
. If
equals the public key
of the Merkle signature scheme, the signature is valid.
References
* E. Dahmen, M. Dring, E. Klintsevich, J. Buchmann, L.C. Coronado Garca. "CMSS - an improved merkle signature scheme". Progress in Cryptology - Indocrypt 2006, 2006.
* E. Klintsevich, K. Okeya, C.Vuillaume, J. Buchmann, E.Dahmen. "Merkle signatures with virtually unlimited signature capacity". 5th International Conference on Applied Cryptography and Network Security - ACNS07, 2007.
* S. Micali, M. Jakobsson, T. Leighton, M. Szydlo. "Fractal merkle tree representation and traversal". RSA-CT 03, 2003
External links
Efficient Use of Merkle Trees-
RSA labs explanation of the original purpose of Merkle trees + Lamport signatures, as an efficient one-time signature scheme.
An introduction to hash-based signatures and Merkle signatures by Adam Langley.A 4 parts series on hash-based signatures by David Wong.{{Cryptography navbox , public-key
Digital signature schemes
Hash-based cryptography
Post-quantum cryptography
Public-key cryptography