Hash Your Keys Before Signing

dc.contributor.authorAulbach, Thomas
dc.contributor.authorDüzlü, Samed
dc.contributor.authorMeyer, Michael
dc.contributor.authorStruck, Patrick
dc.contributor.authorWeishäupl, Maximiliane
dc.date.accessioned2024-11-27T10:35:19Z
dc.date.available2024-11-27T10:35:19Z
dc.date.issued2024
dc.description.abstractIn this work, we analyze the so-called Beyond UnForgeability Features (BUFF) security of the submissions to the current standardization process of additional signatures by NIST. The BUFF notions formalize security against maliciously generated keys and have various real-world use cases, where security can be guaranteed despite misuse potential on a protocol level. Consequently, NIST declared the security against the BUFF notions as desirable features. Despite NIST’s interest, only 6 out of 40 schemes consider BUFF security at all, but none give a detailed analysis. We close this gap by analyzing the schemes based on codes, isogenies, lattices, and multivariate equations. The results vary from schemes that achieve neither notion (e.g., Wave) to schemes that achieve all notions (e.g., Prov). In particular, we dispute certain claims by Squirrels and Vox regarding their BUFF security. Resulting from our analysis, we observe that three schemes (Cross, Hawk and Prov) achieve BUFF security without having the hash of public key and message as part of the signature, as BUFF transformed schemes would have. Hawk and Prov essentially use the lighter PS-3 transform by Pornin and Stern (ACNS’05). We further point out whether this transform suffices for the other schemes to achieve the BUFF notions, with both positive and negative results.
dc.description.versionpublisheddeu
dc.identifier.doi10.1007/978-3-031-62746-0_13
dc.identifier.urihttps://kops.uni-konstanz.de/handle/123456789/71469
dc.language.isoeng
dc.subjectSignature Schemes
dc.subjectBUFF
dc.subjectAdditional Security
dc.subjectProperties
dc.subject.ddc004
dc.titleHash Your Keys Before Signingeng
dc.typeINPROCEEDINGS
dspace.entity.typePublication
kops.citation.bibtex
@inproceedings{Aulbach2024Befor-71469,
  year={2024},
  doi={10.1007/978-3-031-62746-0_13},
  title={Hash Your Keys Before Signing},
  number={14772},
  isbn={978-3-031-62745-3},
  publisher={Springer Nature Switzerland},
  address={Cham},
  series={Lecture Notes in Computer Science (LNCS)},
  booktitle={Post-Quantum Cryptography : 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II},
  pages={301--335},
  editor={Saarinen, Markku-Juhani and Smith-Tone, Daniel},
  author={Aulbach, Thomas and Düzlü, Samed and Meyer, Michael and Struck, Patrick and Weishäupl, Maximiliane}
}
kops.citation.iso690AULBACH, Thomas, Samed DÜZLÜ, Michael MEYER, Patrick STRUCK, Maximiliane WEISHÄUPL, 2024. Hash Your Keys Before Signing. PQCrypto 2024 : 15th International Conference on Post-Quantum Cryptography. Oxford, UK, 12. Juni 2024 - 14. Juni 2024. In: SAARINEN, Markku-Juhani, Hrsg., Daniel SMITH-TONE, Hrsg.. Post-Quantum Cryptography : 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II. Cham: Springer Nature Switzerland, 2024, S. 301-335. Lecture Notes in Computer Science (LNCS). 14772. ISBN 978-3-031-62745-3. Verfügbar unter: doi: 10.1007/978-3-031-62746-0_13deu
kops.citation.iso690AULBACH, Thomas, Samed DÜZLÜ, Michael MEYER, Patrick STRUCK, Maximiliane WEISHÄUPL, 2024. Hash Your Keys Before Signing. PQCrypto 2024 : 15th International Conference on Post-Quantum Cryptography. Oxford, UK, Jun 12, 2024 - Jun 14, 2024. In: SAARINEN, Markku-Juhani, ed., Daniel SMITH-TONE, ed.. Post-Quantum Cryptography : 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II. Cham: Springer Nature Switzerland, 2024, pp. 301-335. Lecture Notes in Computer Science (LNCS). 14772. ISBN 978-3-031-62745-3. Available under: doi: 10.1007/978-3-031-62746-0_13eng
kops.citation.rdf
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/71469">
    <dc:creator>Aulbach, Thomas</dc:creator>
    <dcterms:title>Hash Your Keys Before Signing</dcterms:title>
    <dc:contributor>Struck, Patrick</dc:contributor>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dc:contributor>Weishäupl, Maximiliane</dc:contributor>
    <dc:contributor>Aulbach, Thomas</dc:contributor>
    <dc:creator>Meyer, Michael</dc:creator>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2024-11-27T10:35:19Z</dcterms:available>
    <dc:creator>Weishäupl, Maximiliane</dc:creator>
    <dc:language>eng</dc:language>
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2024-11-27T10:35:19Z</dc:date>
    <dc:creator>Düzlü, Samed</dc:creator>
    <dc:contributor>Düzlü, Samed</dc:contributor>
    <dc:creator>Struck, Patrick</dc:creator>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <dc:contributor>Meyer, Michael</dc:contributor>
    <bibo:uri rdf:resource="https://kops.uni-konstanz.de/handle/123456789/71469"/>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
    <dcterms:issued>2024</dcterms:issued>
    <dcterms:abstract>In this work, we analyze the so-called Beyond UnForgeability Features (BUFF) security of the submissions to the current standardization process of additional signatures by NIST. The BUFF notions formalize security against maliciously generated keys and have various real-world use cases, where security can be guaranteed despite misuse potential on a protocol level. Consequently, NIST declared the security against the BUFF notions as desirable features. Despite NIST’s interest, only 6 out of 40 schemes consider BUFF security at all, but none give a detailed analysis. We close this gap by analyzing the schemes based on codes, isogenies, lattices, and multivariate equations. The results vary from schemes that achieve neither notion (e.g., Wave) to schemes that achieve all notions (e.g., Prov). In particular, we dispute certain claims by Squirrels and Vox regarding their BUFF security. Resulting from our analysis, we observe that three schemes (Cross, Hawk and Prov) achieve BUFF security without having the hash of public key and message as part of the signature, as BUFF transformed schemes would have. Hawk and Prov essentially use the lighter PS-3 transform by Pornin and Stern (ACNS’05). We further point out whether this transform suffices for the other schemes to achieve the BUFF notions, with both positive and negative results.</dcterms:abstract>
  </rdf:Description>
</rdf:RDF>
kops.conferencefieldPQCrypto 2024 : 15th International Conference on Post-Quantum Cryptography, 12. Juni 2024 - 14. Juni 2024, Oxford, UKdeu
kops.date.conferenceEnd2024-06-14
kops.date.conferenceStart2024-06-12
kops.description.funding{"first":"dfg","second":"505500359"}
kops.description.funding{"first":"dfg","second":"236615297"}
kops.description.funding{"first":"brd","second":"16KISK033"}
kops.description.funding{"first":"brd","second":"16KISQ111"}
kops.flag.knbibliographytrue
kops.location.conferenceOxford, UK
kops.sourcefieldSAARINEN, Markku-Juhani, Hrsg., Daniel SMITH-TONE, Hrsg.. <i>Post-Quantum Cryptography : 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II</i>. Cham: Springer Nature Switzerland, 2024, S. 301-335. Lecture Notes in Computer Science (LNCS). 14772. ISBN 978-3-031-62745-3. Verfügbar unter: doi: 10.1007/978-3-031-62746-0_13deu
kops.sourcefield.plainSAARINEN, Markku-Juhani, Hrsg., Daniel SMITH-TONE, Hrsg.. Post-Quantum Cryptography : 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II. Cham: Springer Nature Switzerland, 2024, S. 301-335. Lecture Notes in Computer Science (LNCS). 14772. ISBN 978-3-031-62745-3. Verfügbar unter: doi: 10.1007/978-3-031-62746-0_13deu
kops.sourcefield.plainSAARINEN, Markku-Juhani, ed., Daniel SMITH-TONE, ed.. Post-Quantum Cryptography : 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II. Cham: Springer Nature Switzerland, 2024, pp. 301-335. Lecture Notes in Computer Science (LNCS). 14772. ISBN 978-3-031-62745-3. Available under: doi: 10.1007/978-3-031-62746-0_13eng
kops.title.conferencePQCrypto 2024 : 15th International Conference on Post-Quantum Cryptography
relation.isAuthorOfPublication56d3cbd4-d902-478d-aba1-2d3d478b8ea8
relation.isAuthorOfPublication.latestForDiscovery56d3cbd4-d902-478d-aba1-2d3d478b8ea8
source.bibliographicInfo.fromPage301
source.bibliographicInfo.seriesNumber14772
source.bibliographicInfo.toPage335
source.contributor.editorSaarinen, Markku-Juhani
source.contributor.editorSmith-Tone, Daniel
source.identifier.isbn978-3-031-62745-3
source.publisherSpringer Nature Switzerland
source.publisher.locationCham
source.relation.ispartofseriesLecture Notes in Computer Science (LNCS)
source.titlePost-Quantum Cryptography : 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II

Dateien