State Management for Hash-Based Signatures

被引:25
|
作者
McGrew, David [1 ]
Kampanakis, Panos [1 ]
Fluhrer, Scott [1 ]
Gazdag, Stefan-Lukas [2 ]
Butin, Denis [3 ]
Buchmann, Johannes [3 ]
机构
[1] Cisco Syst, San Jose, TX USA
[2] Genua GmbH, Munich, Germany
[3] Tech Univ Darmstadt, Darmstadt, Germany
来源
关键词
Post-quantum cryptography; Hash-based signatures; Statefulness; System integration;
D O I
10.1007/978-3-319-49100-4_11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The unavoidable transition to post-quantum cryptography requires dependable quantum-safe digital signature schemes. Hash-based signatures are well-understood and promising candidates, and the object of current standardization efforts. In the scope of this standardization process, the most commonly raised concern is statefulness, due to the use of one-time signature schemes. While the theory of hash-based signatures is mature, a discussion of the system security issues arising from the concrete management of their state has been lacking. In this paper, we analyze state management in N-time hash-based signature schemes, considering both security and performance, and categorize the security issues that can occur due to state synchronization failures. We describe a state reservation and nonvolatile storage, and show that it can be naturally realized in a hierarchical signature scheme. To protect against unintentional copying of the private key state, we consider a hybrid stateless/stateful scheme, which provides a graceful security degradation in the face of unintentional copying, at the cost of increased signature size. Compared to a completely stateless scheme, the hybrid approach realizes the essential benefits, with smaller signatures and faster signing.
引用
收藏
页码:244 / 260
页数:17
相关论文
共 50 条
  • [1] Hash-Based Signatures: State of Play
    Butin, Denis
    IEEE SECURITY & PRIVACY, 2017, 15 (04) : 37 - 43
  • [2] Shorter hash-based signatures
    Pereira, Geovandro C. C. F.
    Puodzius, Cassius
    Barreto, Paulo S. L. M.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 116 : 95 - 100
  • [3] Hash-based signatures for the Internet of Things
    Palmieri, Paolo
    2018 ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2018, : 332 - 335
  • [4] Improving Stateless Hash-Based Signatures
    Aumasson, Jean-Philippe
    Endignoux, Guillaume
    TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 219 - 242
  • [5] Hash-Based TPM Signatures for the Quantum World
    Ando, Megumi
    Guttman, Joshua D.
    Papaleo, Alberto R.
    Scire, John
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 77 - 94
  • [6] Fast hash-based signatures on constrained devices
    Rohde, Sebastian
    Eisenbarth, Thomas
    Dahmen, Erik
    Buchmann, Johannes
    Paar, Christof
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2008, 5189 : 104 - +
  • [7] Faster Hash-Based Signatures with Bounded Leakage
    Eisenbarth, Thomas
    von Maurich, Ingo
    Ye, Xin
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 223 - 243
  • [8] SPHINCS: Practical Stateless Hash-Based Signatures
    Bernstein, Daniel J.
    Hopwood, Daira
    Hulsing, Andreas
    Lange, Tanja
    Niederhagen, Ruben
    Papachristodoulou, Louiza
    Schneider, Michael
    Schwabe, Peter
    Wilcox-O'Hearn, Zooko
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 368 - 397
  • [9] Proof-of-Forgery for Hash-based Signatures
    Kiktenko, Evgeniy
    Kudinov, Mikhail
    Bulychev, Andrey
    Fedorov, Aleksey
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 333 - 342
  • [10] Is Java']Java Card Ready for Hash-Based Signatures?
    van der Laan, Ebo
    Poll, Erik
    Rijneveld, Joost
    de Ruiter, Joeri
    Schwabe, Peter
    Verschuren, Jan
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2018, 2018, 11049 : 127 - 142