SEARCH Articles Figures Tables Authenticity Fail-stop signature scheme with top-down tree authentication Top-Down Tree Authentication with Small Amount of Private Storage