INFLUENCE OF BRANCHING DEGREE IN SIGNATURE TREES BASED ON ONE-TIME SIGNATURES ON THE EFFICIENCY OF THEIR USE

Authors

DOI:

https://doi.org/10.15407/dopovidi2026.02.012

Keywords:

hash function, digital signatures, one­time signatures, many­time signatures, sequential trees, full trees

Abstract

The article provides a comprehensive study of the influence of the branching degree N on the performance of many-time tree-based digital signatures built on one-time digital signatures . Two main types of structures are considered: stateful sequential trees and full (stateless) trees that dynamically reconstruct the signature .  It is theoretically substantiated and empirically confirmed that traditional binary trees (N = 2) are not optimal across most metrics, with the exception of initial signing speed in sequential structures . It was established that for both types of structures, the optimal balance between reconstruction time, signature size, and verification speed is achieved at N = 3 and N = 4 . However, for sequential trees within the studied intervals, the branching degree N = 3 demonstrates slightly higher efficiency terms of signature size and construction time, contrary to theoretical assumptions . It is proved that a further increase in N leads to an insignificant acceleration of the verification process, while causing a significant linear increase in signature generation costs . The results of the work allow to select the architecture of quantum-resistant authentication systems with optimization based on performance priorities and device resource constraints .

Downloads

Download data is not yet available.

References

Boneh, D., & Shoup, V. (2023). A graduate course in applied cryptography. Version 0.6, pp. 584-594. Retrieved from https://crypto.stanford.edu/~dabo/cryptobook/BonehShoup_0_6.pdf

Merkle, R. C. (1990). A certified digital signature. In Brassard, G. (Ed.), Advances in cryptology — CRYPTO’ 89 Proceedings (pp. 218-238). New York: Springer. https://doi.org/10.1007/0-387-34805-0_21

Perrig, A. (2001). The BiBa one-time signature and broadcast authentication protocol. In Proceedings of the 8th ACM conference on Computer and Communications Security (pp. 28-37). New York: Association for Computing Machinery. https://doi.org/10.1145/501983.501988

Reyzin, L., & Reyzin, N. (2002). Better than BiBa: Short one-time signatures with fast signing and verifying. In Batten, L. & Seberry, J. (Eds.), Information Security and Privacy. Lecture Notes in Computer Science,Vol. 2384 (pp. 144-153). Berlin, Heidelberg: Springer. https://doi.org/10.1007/3-540-45450-0_11

Katz, J., & Lindell, Y. (2015). Introduction to modern cryptography. 2nd ed. (pp. 465-473). Boca Raton: CRC Press. https://doi.org/10.1201/b17668

Anisimov, A., & Bashuk, O. (2024). Implementation and comparison of hash function-based multi-time digital signature protocols. Proceedings of the XI International Scientific Conference “Information Technology and Implementation”, Vol. 3909 (pp. 500-506). Kyiv. Retrieved from https://ceur-ws.org/Vol-3909/Short_1.pdf

National Institute of Standards and Technology. (2015). Secure Hash Standard (SHS) (FIPS PUB 180-4). U.S. Department of Commerce. https://doi.org/10.6028/NIST.FIPS.180-4

Published

29.04.2026

How to Cite

Bashuk, O. (2026). INFLUENCE OF BRANCHING DEGREE IN SIGNATURE TREES BASED ON ONE-TIME SIGNATURES ON THE EFFICIENCY OF THEIR USE. Reports of the National Academy of Sciences of Ukraine, (2), 12–25. https://doi.org/10.15407/dopovidi2026.02.012

Issue

Section

Information Science and Cybernetics