Subversion resistant identity-based signature

被引:0
作者
Ouyang, Mengdi [1 ]
Yang, Cuixiang [1 ]
Liao, Xiaojuan [2 ]
Li, Fagen [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Technol, Chengdu 611731, Sichuan, Peoples R China
[2] Chengdu Univ Technol, Sichuan Engn Technol Res Ctr Ind Internet Intellig, Chengdu 610059, Sichuan, Peoples R China
基金
中国国家自然科学基金;
关键词
Identity-based signature; Subversion attack; Cryptpographic reverse firewall; SCHEME;
D O I
10.1016/j.sysarc.2025.103385
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based cryptography (IBC) resolves the issue of certificate management, establishing itself as an evolving industry standard. Identity-based signature (IBS), an essential element of IBC, ensures integrity and authentication, playing a crucial role in the domains of internet of things (IoT) and cloud computing. Nevertheless, the "Snowden" event exposed how attackers subverted cryptographic algorithms' implementations to undermine security and conduct mass-surveillance. We explore a subversion attack (SA) model on IBS and define two properties including undetectability and strong key recoverability. Our SA enables a recovery of the master private key and a private key through any two successive signatures, posing a greater challenge. Cryptographic reverse firewalls (RFs) are the main countermeasures to resist SAs. However, existing works necessitate the storage of randomness corresponding to various identities and fail to resist bit-by-bit SA. To address the aforementioned issue, we formulate a system model and a security model for subversion-resistant identity-based signature (SR-IBS). Then, we establish an instance and prove SR-IBS's security of existential unforgeability under chosen message attack (EUF-CMA) along with subversion resistance. Finally, we leverage pypbc library to conduct a comprehensive experiment analysis. The results indicate the execution difference between subverted IBS and pure one is around 2ms and RFs only add approximately 0.5% of overall execution across five different security level. SR-IBS provides subversion-resistant without increasing high computation burden.
引用
收藏
页数:11
相关论文
共 44 条
[41]  
Young A., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P89
[42]  
Young A., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P62
[43]   Practical algorithm substitution attack on extractable signatures [J].
Zhao, Yi ;
Liang, Kaitai ;
Zhao, Yanqi ;
Yang, Bo ;
Ming, Yang ;
Panaousis, Emmanouil .
DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (04) :921-937
[44]   Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks [J].
Zhou, Yuyang ;
Zhao, Liang ;
Jin, Yuqiao ;
Li, Fagen .
INFORMATION SCIENCES, 2022, 604 :80-96