State Management for Hash-Based Signatures

被引:25
|
作者
McGrew, David [1 ]
Kampanakis, Panos [1 ]
Fluhrer, Scott [1 ]
Gazdag, Stefan-Lukas [2 ]
Butin, Denis [3 ]
Buchmann, Johannes [3 ]
机构
[1] Cisco Syst, San Jose, TX USA
[2] Genua GmbH, Munich, Germany
[3] Tech Univ Darmstadt, Darmstadt, Germany
来源
关键词
Post-quantum cryptography; Hash-based signatures; Statefulness; System integration;
D O I
10.1007/978-3-319-49100-4_11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The unavoidable transition to post-quantum cryptography requires dependable quantum-safe digital signature schemes. Hash-based signatures are well-understood and promising candidates, and the object of current standardization efforts. In the scope of this standardization process, the most commonly raised concern is statefulness, due to the use of one-time signature schemes. While the theory of hash-based signatures is mature, a discussion of the system security issues arising from the concrete management of their state has been lacking. In this paper, we analyze state management in N-time hash-based signature schemes, considering both security and performance, and categorize the security issues that can occur due to state synchronization failures. We describe a state reservation and nonvolatile storage, and show that it can be naturally realized in a hierarchical signature scheme. To protect against unintentional copying of the private key state, we consider a hybrid stateless/stateful scheme, which provides a graceful security degradation in the face of unintentional copying, at the cost of increased signature size. Compared to a completely stateless scheme, the hybrid approach realizes the essential benefits, with smaller signatures and faster signing.
引用
收藏
页码:244 / 260
页数:17
相关论文
共 50 条
  • [31] Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model
    Eaton, Edward
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017, 2018, 10719 : 263 - 280
  • [32] Poster: Signer Discretion is Advised: On the Insecurity of Vitalik's Threshold Hash-based Signatures
    Yaksetig, Mario
    Havlin, Alexander
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3597 - 3599
  • [33] A hash-based image encryption algorithm
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    McKevitt, Paul
    OPTICS COMMUNICATIONS, 2010, 283 (06) : 879 - 893
  • [34] Hash-Based Key Management Schemes for MPEG4-FGS
    Karroumi, Mohamed
    Massoudi, Ayoub
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 245 - 256
  • [35] HASH-BASED ALGORITHMS FOR DISCRETIZED DATA
    Robey, Rachel N.
    Nicholaeff, David
    Robey, Robert W.
    SIAM JOURNAL ON SCIENTIFIC COMPUTING, 2013, 35 (04): : C346 - C368
  • [36] Global Optimization for Hash-based Splitting
    Medagliani, Paolo
    Leguay, Jeremie
    Abdullah, Mohammed
    Leconte, Mathieu
    Paris, Stefano
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [37] A Hash-Based Public Key Cryptosystem
    Yin, Qian
    Luo, Gang
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 383 - 392
  • [38] Hash-Based Direct Anonymous Attestation
    Chen, Liqun
    Dong, Changyu
    El Kassem, Nada
    Newton, Christopher J. P.
    Wang, Yalan
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 : 565 - 600
  • [39] Hash-based dynamic source routing
    Castelluccia, C
    Mutaf, P
    NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1012 - 1023
  • [40] Hash-based Structural Join algorithms
    Mathis, Christian
    Haerder, Theo
    CURRENT TRENDS IN DATABASE TECHNOLOGY - EDBT 2006, 2006, 4254 : 136 - 149