On the Provable Security of (EC)DSA Signatures

被引:31
|
作者
Fersch, Manuel [1 ]
Kiltz, Eike [1 ]
Poettering, Bertram [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
关键词
Provable security; DSA; ECDSA; GOST; SM2; SCHEMES; ECDSA; ATTACKS; DSA;
D O I
10.1145/2976749.2978413
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among the signature schemes most widely deployed in practice are the DSA (Digital Signature Algorithm) and its elliptic curves variant ECDSA. They are represented in many international standards, including IEEE P1363, ANSI X9.62, and FIPS 186-4. Their popularity stands in stark contrast to the absence of rigorous security analyses: Previous works either study modified versions of (EC)DSA or provide a security analysis of unmodified ECDSA in the generic group model. Unfortunately, works following the latter approach assume abstractions of non-algebraic functions over generic groups for which it remains unclear how they translate to the security of ECDSA in practice. For instance, it has been pointed out that prior results in the generic group model actually establish strong unforgeability of ECDSA, a property that the scheme de facto does not possess. As, further, no formal results are known for DSA, understanding the security of both schemes remains an open problem. In this work we propose GenDSA, a signature framework that subsumes both DSA and ECDSA in unmodified form. It carefully models the "modulo q" conversion function of (EC)DSA as a composition of three independent functions. The two outer functions mimic algebraic properties in the function's domain and range, the inner one is modeled as a bijective random oracle. We rigorously prove results on the security of GenDSA that indicate that forging signatures in (EC)DSA is as hard as solving discrete logarithms. Importantly, our proofs do not assume generic group behavior.
引用
收藏
页码:1651 / 1662
页数:12
相关论文
共 50 条
  • [1] Limits in the Provable Security of ECDSA Signatures
    Hartmann, Dominik
    Kiltz, Eike
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 279 - 309
  • [2] Efficient partially blind signatures with provable security
    Wu, Qianhong
    Susilo, Willy
    Mu, Yi
    Zhang, Fanguo
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 3, PROCEEDINGS, 2007, 4707 : 1096 - +
  • [3] Efficient partially blind signatures with provable security
    Wu, Qianhong
    Susilo, Willy
    Mu, Yi
    Zhang, Fanguo
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, 2006, 3982 : 345 - 354
  • [4] Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security
    Zhang, Lei
    Wu, Qianhong
    Domingo-Ferrer, Josep
    Qin, Bo
    Zeng, Peng
    INFORMATION SCIENCES, 2014, 272 : 223 - 237
  • [5] Provable security of digital signatures in the tamper-proof device model
    Varnovskii, N. P.
    DISCRETE MATHEMATICS AND APPLICATIONS, 2008, 18 (04): : 427 - 437
  • [6] On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks
    Morita, Hiraku
    Schuldt, Jacob C. N.
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Iwata, Tetsu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) : 73 - 90
  • [7] Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security
    Gennaro, Rosario
    Goldfeder, Steven
    Narayanan, Arvind
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 156 - 174
  • [8] Another look at "provable security"
    Koblitz, Neal
    Menezes, Alfred J.
    JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 3 - 37
  • [9] Provable Security in the Real World
    Degabriele, Jean Paul
    Paterson, Kenneth G.
    Watson, Gaven J.
    IEEE SECURITY & PRIVACY, 2011, 9 (03) : 33 - 41
  • [10] A Brief Introduction to Provable Security
    Santiago, S. D.
    Garcia, G. G.
    Henriquez, L. M. R.
    Cortes, N. C.
    IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (05) : 2323 - 2332