Generic groups, collision resistance, and ECDSA

被引:61
作者
Brown, DRL [1 ]
机构
[1] Certicom Res, Mississauga, ON, Canada
关键词
public key cryptography; provable security; digital signatures;
D O I
10.1007/s10623-003-6154-z
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Proved here is the sufficiency of certain conditions to ensure the Elliptic Curve Digital Signature Algorithm (ECDSA) existentially unforgeable by adaptive chosen-message attacks. The sufficient conditions include (i) a uniformity property and collision-resistance for the underlying hash function, (ii) pseudorandomness in the private key space for the ephemeral private key generator, (iii) generic treatment of the underlying group, and (iv) a further condition on how the ephemeral public keys are mapped into the private key space. For completeness, a brief survey of necessary security conditions is also given. Some of the necessary conditions are weaker than the corresponding sufficient conditions used in the security proofs here, but others are identical. Despite the similarity between DSA and ECDSA, the main result is not appropriate for DSA, because the fourth condition above seems to fail for DSA. (The corresponding necessary condition is plausible for DSA, but is not proved here nor is the security of DSA proved assuming this weaker condition.) Brickell et al. [Vol. 1751 of Lecture Notes in computer Science, pp. 276-292], Jakobsson et al. [Vol. 1976 of Lecture Notes in computer Science, pp. 73-89] and Pointcheval et al. [Vol. 13 of Journal of Cryptology, pp. 361-396] only consider signature schemes that include the ephemeral public key in the hash input, which ECDSA does not do, and moreover, assume a condition on the hash function stronger than the first condition above. This work seems to be the first advance in the provable security of ECDSA.
引用
收藏
页码:119 / 152
页数:34
相关论文
共 55 条
[1]  
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
[2]  
[Anonymous], 2000, 1862 FIPS NAT I STAN
[3]  
[Anonymous], 1996, Advances in Cryptology-CRYPTO 1996, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings
[4]  
*ANSI, 1999, X962 ANSI
[5]  
Bellare M, 1996, LECT NOTES COMPUT SC, V1070, P399
[6]  
Bellare M, 1997, LECT NOTES COMPUT SC, V1294, P277
[7]  
Bellare M., 1995, P 1 ACM C COMPUTER C, P62
[8]  
Blake I.F., 1999, LONDON MATH SOC LECT, V265
[9]  
Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
[10]  
BLEICHENBACHER D, 2001, MONT WORKSH