SEARCH Articles Figures Tables Authenticity Fail signature scheme Fail-stop Signature Signature scheme Top-down tree authentication