State Management for Hash-Based Signatures

被引:25
|
作者
McGrew, David [1 ]
Kampanakis, Panos [1 ]
Fluhrer, Scott [1 ]
Gazdag, Stefan-Lukas [2 ]
Butin, Denis [3 ]
Buchmann, Johannes [3 ]
机构
[1] Cisco Syst, San Jose, TX USA
[2] Genua GmbH, Munich, Germany
[3] Tech Univ Darmstadt, Darmstadt, Germany
来源
关键词
Post-quantum cryptography; Hash-based signatures; Statefulness; System integration;
D O I
10.1007/978-3-319-49100-4_11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The unavoidable transition to post-quantum cryptography requires dependable quantum-safe digital signature schemes. Hash-based signatures are well-understood and promising candidates, and the object of current standardization efforts. In the scope of this standardization process, the most commonly raised concern is statefulness, due to the use of one-time signature schemes. While the theory of hash-based signatures is mature, a discussion of the system security issues arising from the concrete management of their state has been lacking. In this paper, we analyze state management in N-time hash-based signature schemes, considering both security and performance, and categorize the security issues that can occur due to state synchronization failures. We describe a state reservation and nonvolatile storage, and show that it can be naturally realized in a hierarchical signature scheme. To protect against unintentional copying of the private key state, we consider a hybrid stateless/stateful scheme, which provides a graceful security degradation in the face of unintentional copying, at the cost of increased signature size. Compared to a completely stateless scheme, the hybrid approach realizes the essential benefits, with smaller signatures and faster signing.
引用
收藏
页码:244 / 260
页数:17
相关论文
共 50 条
  • [21] Precomputation Methods for Hash-Based Signatures on Energy-Harvesting Platforms
    Aysu, Aydin
    Schaumont, Patrick
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (09) : 2925 - 2931
  • [22] Hash-based directory management for flash memory storage
    Lim, Seung-Ho
    IEICE ELECTRONICS EXPRESS, 2011, 8 (06): : 372 - 377
  • [23] Hash-based counter scheme for digital rights management
    Löytynoja, M
    Seppänen, T
    2005 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), VOLS 1 AND 2, 2005, : 121 - 124
  • [24] To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures
    Wagner, Alexander
    Oberhansl, Felix
    Schink, Marc
    PROCEEDINGS OF THE 2022 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2022, 2022, : 85 - 94
  • [25] Hash-based signature revisited
    Lingyun Li
    Xianhui Lu
    Kunpeng Wang
    Cybersecurity, 5
  • [26] Hash-based encryption system
    Peyravian, M
    Roginsky, A
    Zunic, N
    COMPUTERS & SECURITY, 1999, 18 (04) : 345 - 350
  • [27] Hash-based IP traceback
    Snoeren, AC
    Partridge, C
    Sanchez, LA
    Jones, CE
    Tchakountio, F
    Kent, ST
    Strayer, WT
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (04) : 3 - 14
  • [28] Using trust management to support transferable hash-based micropayments
    Foley, SN
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 1 - 14
  • [29] Hash-based signature revisited
    Li, Lingyun
    Lu, Xianhui
    Wang, Kunpeng
    CYBERSECURITY, 2022, 5 (01)
  • [30] Patent Landscape in the field of Hash-Based Post-Quantum Signatures (Invited Paper)
    Agrawal, Megha
    Duraisamy, Kumar
    Ganesan, Karthikeyan Sabari
    Gupta, Shivam
    Kandele, Suyash
    Konduru, Sai Sandilya
    Maddipati, Harika Chowdary
    Raghavendra, K.
    Sahu, Rajeev Anand
    Saraswat, Vishal
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2023, PT II, 2024, 14460 : 240 - 261