Cargando…
Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security
FORS is the underlying hash-based few-time signing scheme in SPHINCS[Formula: see text], one of the nine signature schemes which advanced to round 2 of the NIST Post-Quantum Cryptography standardization competition. In this paper, we analyze the security of FORS with respect to adaptive chosen messa...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334985/ http://dx.doi.org/10.1007/978-3-030-51938-4_12 |
_version_ | 1783554045188767744 |
---|---|
author | Yehia, Mahmoud AlTawy, Riham Aaron Gulliver, T. |
author_facet | Yehia, Mahmoud AlTawy, Riham Aaron Gulliver, T. |
author_sort | Yehia, Mahmoud |
collection | PubMed |
description | FORS is the underlying hash-based few-time signing scheme in SPHINCS[Formula: see text], one of the nine signature schemes which advanced to round 2 of the NIST Post-Quantum Cryptography standardization competition. In this paper, we analyze the security of FORS with respect to adaptive chosen message attacks. We show that in such a setting, the security of FORS decreases significantly with each signed message when compared to its security against non-adaptive chosen message attacks. We propose a chaining mechanism that with slightly more computation, dynamically binds the Obtain Random Subset (ORS) generation with signing, hence, eliminating the offline advantage of adaptive chosen message adversaries. We apply our chaining mechanism to FORS and present DFORS whose security against adaptive chosen message attacks is equal to the non-adaptive security of FORS. In a nutshell, using SPHINCS[Formula: see text]-128s parameters, FORS provides 75-bit security and DFORS achieves 150-bit security with respect to adaptive chosen message attacks after signing one message. We note that our analysis does not affect the claimed security of SPHINCS[Formula: see text]. Nevertheless, this work provides a better understanding of FORS and other HORS variants, and furnishes a solution if new adaptive cryptanalytic techniques on SPHINCS[Formula: see text] emerge. |
format | Online Article Text |
id | pubmed-7334985 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
record_format | MEDLINE/PubMed |
spelling | pubmed-73349852020-07-06 Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security Yehia, Mahmoud AlTawy, Riham Aaron Gulliver, T. Progress in Cryptology - AFRICACRYPT 2020 Article FORS is the underlying hash-based few-time signing scheme in SPHINCS[Formula: see text], one of the nine signature schemes which advanced to round 2 of the NIST Post-Quantum Cryptography standardization competition. In this paper, we analyze the security of FORS with respect to adaptive chosen message attacks. We show that in such a setting, the security of FORS decreases significantly with each signed message when compared to its security against non-adaptive chosen message attacks. We propose a chaining mechanism that with slightly more computation, dynamically binds the Obtain Random Subset (ORS) generation with signing, hence, eliminating the offline advantage of adaptive chosen message adversaries. We apply our chaining mechanism to FORS and present DFORS whose security against adaptive chosen message attacks is equal to the non-adaptive security of FORS. In a nutshell, using SPHINCS[Formula: see text]-128s parameters, FORS provides 75-bit security and DFORS achieves 150-bit security with respect to adaptive chosen message attacks after signing one message. We note that our analysis does not affect the claimed security of SPHINCS[Formula: see text]. Nevertheless, this work provides a better understanding of FORS and other HORS variants, and furnishes a solution if new adaptive cryptanalytic techniques on SPHINCS[Formula: see text] emerge. 2020-06-06 /pmc/articles/PMC7334985/ http://dx.doi.org/10.1007/978-3-030-51938-4_12 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Yehia, Mahmoud AlTawy, Riham Aaron Gulliver, T. Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security |
title | Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security |
title_full | Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security |
title_fullStr | Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security |
title_full_unstemmed | Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security |
title_short | Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security |
title_sort | hash-based signatures revisited: a dynamic fors with adaptive chosen message security |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334985/ http://dx.doi.org/10.1007/978-3-030-51938-4_12 |
work_keys_str_mv | AT yehiamahmoud hashbasedsignaturesrevisitedadynamicforswithadaptivechosenmessagesecurity AT altawyriham hashbasedsignaturesrevisitedadynamicforswithadaptivechosenmessagesecurity AT aarongullivert hashbasedsignaturesrevisitedadynamicforswithadaptivechosenmessagesecurity |