The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys

dc.contributor.authorDüzlü, Samed
dc.contributor.authorStruck, Patrick
dc.date.accessioned2025-04-15T10:05:16Z
dc.date.available2025-04-15T10:05:16Z
dc.date.issued2025
dc.description.abstractIn the present work, we establish a new relationship among the Beyond UnForgeability Features (BUFF) introduced by Cremers et al. (SP’21). There, the BUFF notions have been shown to be independent of one another. On the other hand, the analysis by Aulbach et al. (PQCrypto’24) reveals that one of the BUFF notions—message-bound signatures (MBS)—is achieved by most schemes. To achieve BUFF security, there is the generic BUFF transform that achieves all the beyond unforgeability features. The BUFF transform works by signing a hash of the public key and the message (rather than just the message), and appending this hash value to the signature. The need for appending the hash comes from the intuitive notion of weak keys that verify all message-signature pairs. We explain that MBS security effectively rules out the possibility of weak keys. This opens the possibility for a more We show that this transform, first introduced by Pornin and Stern (ACNS’05), indeed suffices to achieve BUFF security, if the original signature schemes satisfies MBS. Only in the malicious setting of exclusive ownership, we present an attack on UOV, even after applying the PS-3 transform.
dc.description.versionpublisheddeu
dc.identifier.doi10.1007/978-3-031-75764-8_4
dc.identifier.urihttps://kops.uni-konstanz.de/handle/123456789/73045
dc.language.isoeng
dc.subject.ddc004
dc.titleThe Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keyseng
dc.typeINPROCEEDINGS
dspace.entity.typePublication
kops.citation.bibtex
@inproceedings{Duzlu2025ofMes-73045,
  title={The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys},
  year={2025},
  doi={10.1007/978-3-031-75764-8_4},
  number={15258},
  isbn={978-3-031-75763-1},
  address={Cham},
  publisher={Springer},
  series={Lecture Notes in Computer Science},
  booktitle={Information security : 27th international conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024 : proceedings},
  booktitle={Part 2},
  pages={61--80},
  author={Düzlü, Samed and Struck, Patrick}
}
kops.citation.iso690DÜZLÜ, Samed, Patrick STRUCK, 2025. The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys. ISC 2024 : 27th International Conference. Arlington, VA, USA, 23. Okt. 2024 - 25. Okt. 2024. In: Information security : 27th international conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024 : proceedings. Cham: Springer, 2025, S. 61-80. Lecture Notes in Computer Science. 15258. ISBN 978-3-031-75763-1. Verfügbar unter: doi: 10.1007/978-3-031-75764-8_4deu
kops.citation.iso690DÜZLÜ, Samed, Patrick STRUCK, 2025. The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys. ISC 2024 : 27th International Conference. Arlington, VA, USA, Oct 23, 2024 - Oct 25, 2024. In: Information security : 27th international conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024 : proceedings. Cham: Springer, 2025, pp. 61-80. Lecture Notes in Computer Science. 15258. ISBN 978-3-031-75763-1. Available under: doi: 10.1007/978-3-031-75764-8_4eng
kops.citation.rdf
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/73045">
    <dc:creator>Düzlü, Samed</dc:creator>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2025-04-15T10:05:16Z</dc:date>
    <dc:contributor>Düzlü, Samed</dc:contributor>
    <dc:creator>Struck, Patrick</dc:creator>
    <dc:language>eng</dc:language>
    <bibo:uri rdf:resource="https://kops.uni-konstanz.de/handle/123456789/73045"/>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dcterms:abstract>In the present work, we establish a new relationship among the Beyond UnForgeability Features (BUFF) introduced by Cremers et al. (SP’21). There, the BUFF notions have been shown to be independent of one another. On the other hand, the analysis by Aulbach et al. (PQCrypto’24) reveals that one of the BUFF notions—message-bound signatures (MBS)—is achieved by most schemes. To achieve BUFF security, there is the generic BUFF transform that achieves all the beyond unforgeability features. The BUFF transform works by signing a hash of the public key and the message (rather than just the message), and appending this hash value to the signature. The need for appending the hash comes from the intuitive notion of weak keys that verify all message-signature pairs. We explain that MBS security effectively rules out the possibility of weak keys. This opens the possibility for a more We show that this transform, first introduced by Pornin and Stern (ACNS’05), indeed suffices to achieve BUFF security, if the original signature schemes satisfies MBS. Only in the malicious setting of exclusive ownership, we present an attack on UOV, even after applying the PS-3 transform.</dcterms:abstract>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2025-04-15T10:05:16Z</dcterms:available>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dcterms:issued>2025</dcterms:issued>
    <dc:contributor>Struck, Patrick</dc:contributor>
    <dcterms:title>The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys</dcterms:title>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
  </rdf:Description>
</rdf:RDF>
kops.conferencefieldISC 2024 : 27th International Conference, 23. Okt. 2024 - 25. Okt. 2024, Arlington, VA, USAdeu
kops.date.conferenceEnd2024-10-25
kops.date.conferenceStart2024-10-23
kops.flag.knbibliographytrue
kops.location.conferenceArlington, VA, USA
kops.sourcefield<i>Information security : 27th international conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024 : proceedings</i>. Cham: Springer, 2025, S. 61-80. Lecture Notes in Computer Science. 15258. ISBN 978-3-031-75763-1. Verfügbar unter: doi: 10.1007/978-3-031-75764-8_4deu
kops.sourcefield.plainInformation security : 27th international conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024 : proceedings. Cham: Springer, 2025, S. 61-80. Lecture Notes in Computer Science. 15258. ISBN 978-3-031-75763-1. Verfügbar unter: doi: 10.1007/978-3-031-75764-8_4deu
kops.sourcefield.plainInformation security : 27th international conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024 : proceedings. Cham: Springer, 2025, pp. 61-80. Lecture Notes in Computer Science. 15258. ISBN 978-3-031-75763-1. Available under: doi: 10.1007/978-3-031-75764-8_4eng
kops.title.conferenceISC 2024 : 27th International Conference
relation.isAuthorOfPublication56d3cbd4-d902-478d-aba1-2d3d478b8ea8
relation.isAuthorOfPublication.latestForDiscovery56d3cbd4-d902-478d-aba1-2d3d478b8ea8
source.bibliographicInfo.fromPage61
source.bibliographicInfo.seriesNumber15258
source.bibliographicInfo.toPage80
source.identifier.isbn978-3-031-75763-1
source.publisherSpringer
source.publisher.locationCham
source.relation.ispartofseriesLecture Notes in Computer Science
source.titleInformation security : 27th international conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024 : proceedings
source.titlePart 2

Dateien