Cargando…

Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security

FORS is the underlying hash-based few-time signing scheme in SPHINCS[Formula: see text], one of the nine signature schemes which advanced to round 2 of the NIST Post-Quantum Cryptography standardization competition. In this paper, we analyze the security of FORS with respect to adaptive chosen messa...

Descripción completa

Detalles Bibliográficos
Autores principales: Yehia, Mahmoud, AlTawy, Riham, Aaron Gulliver, T.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334985/
http://dx.doi.org/10.1007/978-3-030-51938-4_12
_version_ 1783554045188767744
author Yehia, Mahmoud
AlTawy, Riham
Aaron Gulliver, T.
author_facet Yehia, Mahmoud
AlTawy, Riham
Aaron Gulliver, T.
author_sort Yehia, Mahmoud
collection PubMed
description FORS is the underlying hash-based few-time signing scheme in SPHINCS[Formula: see text], one of the nine signature schemes which advanced to round 2 of the NIST Post-Quantum Cryptography standardization competition. In this paper, we analyze the security of FORS with respect to adaptive chosen message attacks. We show that in such a setting, the security of FORS decreases significantly with each signed message when compared to its security against non-adaptive chosen message attacks. We propose a chaining mechanism that with slightly more computation, dynamically binds the Obtain Random Subset (ORS) generation with signing, hence, eliminating the offline advantage of adaptive chosen message adversaries. We apply our chaining mechanism to FORS and present DFORS whose security against adaptive chosen message attacks is equal to the non-adaptive security of FORS. In a nutshell, using SPHINCS[Formula: see text]-128s parameters, FORS provides 75-bit security and DFORS achieves 150-bit security with respect to adaptive chosen message attacks after signing one message. We note that our analysis does not affect the claimed security of SPHINCS[Formula: see text]. Nevertheless, this work provides a better understanding of FORS and other HORS variants, and furnishes a solution if new adaptive cryptanalytic techniques on SPHINCS[Formula: see text] emerge.
format Online
Article
Text
id pubmed-7334985
institution National Center for Biotechnology Information
language English
publishDate 2020
record_format MEDLINE/PubMed
spelling pubmed-73349852020-07-06 Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security Yehia, Mahmoud AlTawy, Riham Aaron Gulliver, T. Progress in Cryptology - AFRICACRYPT 2020 Article FORS is the underlying hash-based few-time signing scheme in SPHINCS[Formula: see text], one of the nine signature schemes which advanced to round 2 of the NIST Post-Quantum Cryptography standardization competition. In this paper, we analyze the security of FORS with respect to adaptive chosen message attacks. We show that in such a setting, the security of FORS decreases significantly with each signed message when compared to its security against non-adaptive chosen message attacks. We propose a chaining mechanism that with slightly more computation, dynamically binds the Obtain Random Subset (ORS) generation with signing, hence, eliminating the offline advantage of adaptive chosen message adversaries. We apply our chaining mechanism to FORS and present DFORS whose security against adaptive chosen message attacks is equal to the non-adaptive security of FORS. In a nutshell, using SPHINCS[Formula: see text]-128s parameters, FORS provides 75-bit security and DFORS achieves 150-bit security with respect to adaptive chosen message attacks after signing one message. We note that our analysis does not affect the claimed security of SPHINCS[Formula: see text]. Nevertheless, this work provides a better understanding of FORS and other HORS variants, and furnishes a solution if new adaptive cryptanalytic techniques on SPHINCS[Formula: see text] emerge. 2020-06-06 /pmc/articles/PMC7334985/ http://dx.doi.org/10.1007/978-3-030-51938-4_12 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Yehia, Mahmoud
AlTawy, Riham
Aaron Gulliver, T.
Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security
title Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security
title_full Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security
title_fullStr Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security
title_full_unstemmed Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security
title_short Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security
title_sort hash-based signatures revisited: a dynamic fors with adaptive chosen message security
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334985/
http://dx.doi.org/10.1007/978-3-030-51938-4_12
work_keys_str_mv AT yehiamahmoud hashbasedsignaturesrevisitedadynamicforswithadaptivechosenmessagesecurity
AT altawyriham hashbasedsignaturesrevisitedadynamicforswithadaptivechosenmessagesecurity
AT aarongullivert hashbasedsignaturesrevisitedadynamicforswithadaptivechosenmessagesecurity