On the Provable Security of (EC)DSA Signatures

被引:31
|
作者
Fersch, Manuel [1 ]
Kiltz, Eike [1 ]
Poettering, Bertram [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
关键词
Provable security; DSA; ECDSA; GOST; SM2; SCHEMES; ECDSA; ATTACKS; DSA;
D O I
10.1145/2976749.2978413
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among the signature schemes most widely deployed in practice are the DSA (Digital Signature Algorithm) and its elliptic curves variant ECDSA. They are represented in many international standards, including IEEE P1363, ANSI X9.62, and FIPS 186-4. Their popularity stands in stark contrast to the absence of rigorous security analyses: Previous works either study modified versions of (EC)DSA or provide a security analysis of unmodified ECDSA in the generic group model. Unfortunately, works following the latter approach assume abstractions of non-algebraic functions over generic groups for which it remains unclear how they translate to the security of ECDSA in practice. For instance, it has been pointed out that prior results in the generic group model actually establish strong unforgeability of ECDSA, a property that the scheme de facto does not possess. As, further, no formal results are known for DSA, understanding the security of both schemes remains an open problem. In this work we propose GenDSA, a signature framework that subsumes both DSA and ECDSA in unmodified form. It carefully models the "modulo q" conversion function of (EC)DSA as a composition of three independent functions. The two outer functions mimic algebraic properties in the function's domain and range, the inner one is modeled as a bijective random oracle. We rigorously prove results on the security of GenDSA that indicate that forging signatures in (EC)DSA is as hard as solving discrete logarithms. Importantly, our proofs do not assume generic group behavior.
引用
收藏
页码:1651 / 1662
页数:12
相关论文
共 50 条
  • [41] Digital signatures for centralized DSA networks
    Mathur, Chetan N.
    Subbalakshmi, K. P.
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 1037 - 1041
  • [42] A provable scheme for homomorphic obfuscations in software security
    Zhu, William
    Thomborson, Clark
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 208 - 212
  • [43] Special Issue Cryptography and Provable Security Preface
    Yu, Yong
    Yang, Guomin
    Wang, Huaxiong
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 489 - 492
  • [44] Provable Security against Cryptanalysis with Impossible Differentials
    Aoki, Kazumaro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 233 - 236
  • [45] Provable security for blind signature on discrete logarithm
    Zhou, Xuanwu
    Fu, Yan
    Jin, Zhigang
    Fu, Zhenqiang
    Qin, Lianmin
    Journal of Information and Computational Science, 2010, 7 (14): : 3133 - 3140
  • [46] QUAD: A practical stream cipher with provable security
    Berbain, Come
    Gilbert, Henri
    Patarin, Jacques
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2006, PROCEEDINGS, 2006, 4004 : 109 - 128
  • [47] "Provable" Security against Differential and Linear Cryptanalysis
    Nyberg, Kaisa
    FAST SOFTWARE ENCRYPTION (FSE 2012), 2012, 7549 : 1 - 8
  • [48] Generation of DSA for Security Application
    Amiri, I. S.
    Raman, K.
    Afroozeh, A.
    Jalil, M. A.
    Nawi, I. N.
    Ali, J.
    Yupapin, P. P.
    2ND INTERNATIONAL SCIENCE, SOCIAL SCIENCE, ENGINEERING AND ENERGY CONFERENCE 2010 (I-SEEC 2010), 2011, 8 : 360 - 365
  • [49] Sharing many secrets with computational provable security
    Herranz, Javier
    Ruiz, Alexandre
    Saez, German
    INFORMATION PROCESSING LETTERS, 2013, 113 (14-16) : 572 - 579
  • [50] Provable Security Analysis of FIDO2
    Barbosa, Manuel
    Boldyreva, Alexandra
    Chen, Shan
    Warinschi, Bogdan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 125 - 156