The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys
| dc.contributor.author | Düzlü, Samed | |
| dc.contributor.author | Struck, Patrick | |
| dc.date.accessioned | 2025-04-15T10:05:16Z | |
| dc.date.available | 2025-04-15T10:05:16Z | |
| dc.date.issued | 2025 | |
| dc.description.abstract | In the present work, we establish a new relationship among the Beyond UnForgeability Features (BUFF) introduced by Cremers et al. (SP’21). There, the BUFF notions have been shown to be independent of one another. On the other hand, the analysis by Aulbach et al. (PQCrypto’24) reveals that one of the BUFF notions—message-bound signatures (MBS)—is achieved by most schemes. To achieve BUFF security, there is the generic BUFF transform that achieves all the beyond unforgeability features. The BUFF transform works by signing a hash of the public key and the message (rather than just the message), and appending this hash value to the signature. The need for appending the hash comes from the intuitive notion of weak keys that verify all message-signature pairs. We explain that MBS security effectively rules out the possibility of weak keys. This opens the possibility for a more We show that this transform, first introduced by Pornin and Stern (ACNS’05), indeed suffices to achieve BUFF security, if the original signature schemes satisfies MBS. Only in the malicious setting of exclusive ownership, we present an attack on UOV, even after applying the PS-3 transform. | |
| dc.description.version | published | deu |
| dc.identifier.doi | 10.1007/978-3-031-75764-8_4 | |
| dc.identifier.uri | https://kops.uni-konstanz.de/handle/123456789/73045 | |
| dc.language.iso | eng | |
| dc.subject.ddc | 004 | |
| dc.title | The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys | eng |
| dc.type | INPROCEEDINGS | |
| dspace.entity.type | Publication | |
| kops.citation.bibtex | @inproceedings{Duzlu2025ofMes-73045,
title={The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys},
year={2025},
doi={10.1007/978-3-031-75764-8_4},
number={15258},
isbn={978-3-031-75763-1},
address={Cham},
publisher={Springer},
series={Lecture Notes in Computer Science},
booktitle={Information security : 27th international conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024 : proceedings},
booktitle={Part 2},
pages={61--80},
author={Düzlü, Samed and Struck, Patrick}
} | |
| kops.citation.iso690 | DÜZLÜ, Samed, Patrick STRUCK, 2025. The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys. ISC 2024 : 27th International Conference. Arlington, VA, USA, 23. Okt. 2024 - 25. Okt. 2024. In: Information security : 27th international conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024 : proceedings. Cham: Springer, 2025, S. 61-80. Lecture Notes in Computer Science. 15258. ISBN 978-3-031-75763-1. Verfügbar unter: doi: 10.1007/978-3-031-75764-8_4 | deu |
| kops.citation.iso690 | DÜZLÜ, Samed, Patrick STRUCK, 2025. The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys. ISC 2024 : 27th International Conference. Arlington, VA, USA, Oct 23, 2024 - Oct 25, 2024. In: Information security : 27th international conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024 : proceedings. Cham: Springer, 2025, pp. 61-80. Lecture Notes in Computer Science. 15258. ISBN 978-3-031-75763-1. Available under: doi: 10.1007/978-3-031-75764-8_4 | eng |
| kops.citation.rdf | <rdf:RDF
xmlns:dcterms="http://purl.org/dc/terms/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
xmlns:bibo="http://purl.org/ontology/bibo/"
xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
xmlns:foaf="http://xmlns.com/foaf/0.1/"
xmlns:void="http://rdfs.org/ns/void#"
xmlns:xsd="http://www.w3.org/2001/XMLSchema#" >
<rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/73045">
<dc:creator>Düzlü, Samed</dc:creator>
<foaf:homepage rdf:resource="http://localhost:8080/"/>
<dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2025-04-15T10:05:16Z</dc:date>
<dc:contributor>Düzlü, Samed</dc:contributor>
<dc:creator>Struck, Patrick</dc:creator>
<dc:language>eng</dc:language>
<bibo:uri rdf:resource="https://kops.uni-konstanz.de/handle/123456789/73045"/>
<dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
<dcterms:abstract>In the present work, we establish a new relationship among the Beyond UnForgeability Features (BUFF) introduced by Cremers et al. (SP’21). There, the BUFF notions have been shown to be independent of one another. On the other hand, the analysis by Aulbach et al. (PQCrypto’24) reveals that one of the BUFF notions—message-bound signatures (MBS)—is achieved by most schemes. To achieve BUFF security, there is the generic BUFF transform that achieves all the beyond unforgeability features. The BUFF transform works by signing a hash of the public key and the message (rather than just the message), and appending this hash value to the signature. The need for appending the hash comes from the intuitive notion of weak keys that verify all message-signature pairs. We explain that MBS security effectively rules out the possibility of weak keys. This opens the possibility for a more We show that this transform, first introduced by Pornin and Stern (ACNS’05), indeed suffices to achieve BUFF security, if the original signature schemes satisfies MBS. Only in the malicious setting of exclusive ownership, we present an attack on UOV, even after applying the PS-3 transform.</dcterms:abstract>
<dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2025-04-15T10:05:16Z</dcterms:available>
<dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
<dcterms:issued>2025</dcterms:issued>
<dc:contributor>Struck, Patrick</dc:contributor>
<dcterms:title>The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys</dcterms:title>
<void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
</rdf:Description>
</rdf:RDF> | |
| kops.conferencefield | ISC 2024 : 27th International Conference, 23. Okt. 2024 - 25. Okt. 2024, Arlington, VA, USA | deu |
| kops.date.conferenceEnd | 2024-10-25 | |
| kops.date.conferenceStart | 2024-10-23 | |
| kops.flag.knbibliography | true | |
| kops.location.conference | Arlington, VA, USA | |
| kops.sourcefield | <i>Information security : 27th international conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024 : proceedings</i>. Cham: Springer, 2025, S. 61-80. Lecture Notes in Computer Science. 15258. ISBN 978-3-031-75763-1. Verfügbar unter: doi: 10.1007/978-3-031-75764-8_4 | deu |
| kops.sourcefield.plain | Information security : 27th international conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024 : proceedings. Cham: Springer, 2025, S. 61-80. Lecture Notes in Computer Science. 15258. ISBN 978-3-031-75763-1. Verfügbar unter: doi: 10.1007/978-3-031-75764-8_4 | deu |
| kops.sourcefield.plain | Information security : 27th international conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024 : proceedings. Cham: Springer, 2025, pp. 61-80. Lecture Notes in Computer Science. 15258. ISBN 978-3-031-75763-1. Available under: doi: 10.1007/978-3-031-75764-8_4 | eng |
| kops.title.conference | ISC 2024 : 27th International Conference | |
| relation.isAuthorOfPublication | 56d3cbd4-d902-478d-aba1-2d3d478b8ea8 | |
| relation.isAuthorOfPublication.latestForDiscovery | 56d3cbd4-d902-478d-aba1-2d3d478b8ea8 | |
| source.bibliographicInfo.fromPage | 61 | |
| source.bibliographicInfo.seriesNumber | 15258 | |
| source.bibliographicInfo.toPage | 80 | |
| source.identifier.isbn | 978-3-031-75763-1 | |
| source.publisher | Springer | |
| source.publisher.location | Cham | |
| source.relation.ispartofseries | Lecture Notes in Computer Science | |
| source.title | Information security : 27th international conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024 : proceedings | |
| source.title | Part 2 |