On the Provable Security of (EC)DSA Signatures

被引:31
|
作者
Fersch, Manuel [1 ]
Kiltz, Eike [1 ]
Poettering, Bertram [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
关键词
Provable security; DSA; ECDSA; GOST; SM2; SCHEMES; ECDSA; ATTACKS; DSA;
D O I
10.1145/2976749.2978413
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among the signature schemes most widely deployed in practice are the DSA (Digital Signature Algorithm) and its elliptic curves variant ECDSA. They are represented in many international standards, including IEEE P1363, ANSI X9.62, and FIPS 186-4. Their popularity stands in stark contrast to the absence of rigorous security analyses: Previous works either study modified versions of (EC)DSA or provide a security analysis of unmodified ECDSA in the generic group model. Unfortunately, works following the latter approach assume abstractions of non-algebraic functions over generic groups for which it remains unclear how they translate to the security of ECDSA in practice. For instance, it has been pointed out that prior results in the generic group model actually establish strong unforgeability of ECDSA, a property that the scheme de facto does not possess. As, further, no formal results are known for DSA, understanding the security of both schemes remains an open problem. In this work we propose GenDSA, a signature framework that subsumes both DSA and ECDSA in unmodified form. It carefully models the "modulo q" conversion function of (EC)DSA as a composition of three independent functions. The two outer functions mimic algebraic properties in the function's domain and range, the inner one is modeled as a bijective random oracle. We rigorously prove results on the security of GenDSA that indicate that forging signatures in (EC)DSA is as hard as solving discrete logarithms. Importantly, our proofs do not assume generic group behavior.
引用
收藏
页码:1651 / 1662
页数:12
相关论文
共 50 条
  • [31] The Provable Extracting Security of Information Hiding
    Liu Jing
    Tang Guang-ming
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 519 - 524
  • [32] Efficient steganography with provable security guarantees
    Kiayias, A
    Raekow, Y
    Russell, A
    INFORMATION HIDING, 2005, 3727 : 118 - 130
  • [33] Provable security for block ciphers by decorrelation
    Vaudenay, S
    STACS 98 - 15TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, 1998, 1373 : 249 - 275
  • [34] On the provable security of BEAR and LION schemes
    Maines, Lara
    Piva, Matteo
    Rimoldi, Anna
    Sala, Massimiliano
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2011, 22 (5-6) : 413 - 423
  • [35] PROVABLE SECURITY AGAINST A DIFFERENTIAL ATTACK
    NYBERG, K
    KNUDSEN, LR
    JOURNAL OF CRYPTOLOGY, 1995, 8 (01) : 27 - 37
  • [36] NETWORKS ON CHIP WITH PROVABLE SECURITY PROPERTIES
    Wassel, Hassan M. G.
    Gao, Ying
    Oberg, Jason K.
    Huffmire, Ted
    Kastner, Ryan
    Chong, Frederic T.
    Sherwood, Timothy
    IEEE MICRO, 2014, 34 (03) : 57 - 68
  • [37] Provable security for public key schemes
    Pointcheval, D
    CONTEMPORARY CRYPTOLOGY, 2005, : 133 - 190
  • [38] On the provable security of BEAR and LION schemes
    Lara Maines
    Matteo Piva
    Anna Rimoldi
    Massimiliano Sala
    Applicable Algebra in Engineering, Communication and Computing, 2011, 22 : 413 - 423
  • [39] Fundamental problems in provable security and cryptography
    Dent, Alexander W.
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2006, 364 (1849): : 3215 - 3230
  • [40] Limits of Provable Security for Homomorphic Encryption
    Bogdanov, Andrej
    Lee, Chin Ho
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I, 2013, 8042 : 111 - 128