On the Provable Security of (EC)DSA Signatures

被引:31
作者
Fersch, Manuel [1 ]
Kiltz, Eike [1 ]
Poettering, Bertram [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
来源
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2016年
关键词
Provable security; DSA; ECDSA; GOST; SM2; SCHEMES; ECDSA; ATTACKS; DSA;
D O I
10.1145/2976749.2978413
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among the signature schemes most widely deployed in practice are the DSA (Digital Signature Algorithm) and its elliptic curves variant ECDSA. They are represented in many international standards, including IEEE P1363, ANSI X9.62, and FIPS 186-4. Their popularity stands in stark contrast to the absence of rigorous security analyses: Previous works either study modified versions of (EC)DSA or provide a security analysis of unmodified ECDSA in the generic group model. Unfortunately, works following the latter approach assume abstractions of non-algebraic functions over generic groups for which it remains unclear how they translate to the security of ECDSA in practice. For instance, it has been pointed out that prior results in the generic group model actually establish strong unforgeability of ECDSA, a property that the scheme de facto does not possess. As, further, no formal results are known for DSA, understanding the security of both schemes remains an open problem. In this work we propose GenDSA, a signature framework that subsumes both DSA and ECDSA in unmodified form. It carefully models the "modulo q" conversion function of (EC)DSA as a composition of three independent functions. The two outer functions mimic algebraic properties in the function's domain and range, the inner one is modeled as a bijective random oracle. We rigorously prove results on the security of GenDSA that indicate that forging signatures in (EC)DSA is as hard as solving discrete logarithms. Importantly, our proofs do not assume generic group behavior.
引用
收藏
页码:1651 / 1662
页数:12
相关论文
共 27 条
  • [1] [Anonymous], 2001, P CRYPTOGRAPHY CODIN
  • [2] [Anonymous], 2013, 118892015 ISOIEC
  • [3] Bellare M., 2006, PROC 13 ACM C COMPU, P390, DOI 10.1145/1180405.1180453
  • [4] Brickell E, 2000, LECT NOTES COMPUT SC, V1751, P276
  • [5] Brown D., 2008286 IACR EPRINT
  • [6] Brown D., 2002026 IACR EPRINT
  • [7] Brown D., 2005, Advances in Elliptic Curve Cryptography, P21
  • [8] Generic groups, collision resistance, and ECDSA
    Brown, DRL
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2005, 35 (01) : 119 - 152
  • [9] Dent AW, 2002, LECT NOTES COMPUT SC, V2501, P100
  • [10] Dolmatov V., 2013, R34102012 GOST