On the Provable Security of (EC)DSA Signatures

被引:31
|
作者
Fersch, Manuel [1 ]
Kiltz, Eike [1 ]
Poettering, Bertram [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
关键词
Provable security; DSA; ECDSA; GOST; SM2; SCHEMES; ECDSA; ATTACKS; DSA;
D O I
10.1145/2976749.2978413
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among the signature schemes most widely deployed in practice are the DSA (Digital Signature Algorithm) and its elliptic curves variant ECDSA. They are represented in many international standards, including IEEE P1363, ANSI X9.62, and FIPS 186-4. Their popularity stands in stark contrast to the absence of rigorous security analyses: Previous works either study modified versions of (EC)DSA or provide a security analysis of unmodified ECDSA in the generic group model. Unfortunately, works following the latter approach assume abstractions of non-algebraic functions over generic groups for which it remains unclear how they translate to the security of ECDSA in practice. For instance, it has been pointed out that prior results in the generic group model actually establish strong unforgeability of ECDSA, a property that the scheme de facto does not possess. As, further, no formal results are known for DSA, understanding the security of both schemes remains an open problem. In this work we propose GenDSA, a signature framework that subsumes both DSA and ECDSA in unmodified form. It carefully models the "modulo q" conversion function of (EC)DSA as a composition of three independent functions. The two outer functions mimic algebraic properties in the function's domain and range, the inner one is modeled as a bijective random oracle. We rigorously prove results on the security of GenDSA that indicate that forging signatures in (EC)DSA is as hard as solving discrete logarithms. Importantly, our proofs do not assume generic group behavior.
引用
收藏
页码:1651 / 1662
页数:12
相关论文
共 50 条
  • [21] On provable security for conventional cryptography
    Vaudenay, S
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 1 - 16
  • [22] Provable implementations of security protocols
    Gordon, Andrew D.
    21ST ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2006, : 345 - 346
  • [23] Cryptography and the methodology of provable security
    Stern, J
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2003, 2643 : 1 - 5
  • [24] The provable security of graph-based one-time signatures and extensions to algebraic signature schemes
    Hevia, A
    Micciancio, D
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 379 - 396
  • [25] Impossibility on the Provable Security of the Fiat-Shamir-Type Signatures in the Non-programmable Random Oracle Model
    Fukumitsu, Masayuki
    Hasegawa, Shingo
    INFORMATION SECURITY, (ISC 2016), 2016, 9866 : 389 - 407
  • [26] Provable security of proxy signature schemes
    Gu, CX
    Zhu, YF
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1059 - 1063
  • [27] Provable Security for Outsourcing Database Operations
    Evdokimov, Sergei
    Fischmann, Matthias
    Guenther, Oliver
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (01) : 1 - 17
  • [28] Another look at "provable security" - II
    Koblitz, Neal
    Menezes, Alfred
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 148 - +
  • [29] Quantum proxy signature with provable security
    Xin, Xiangjun
    Yang, Qinglan
    Li, Fagen
    MODERN PHYSICS LETTERS A, 2020, 35 (24)
  • [30] Towards provable security for ubiquitous applications
    Burmester, Mike
    Van Le, Tri
    de Medeiros, Breno
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 295 - 312