Asymmetric Subversion Attacks on Signature Schemes

被引:14
作者
Liu, Chi [1 ]
Chen, Rongmao [1 ]
Wang, Yi [1 ]
Wang, Yongjun [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Peoples R China
来源
INFORMATION SECURITY AND PRIVACY | 2018年 / 10946卷
基金
中国国家自然科学基金;
关键词
Asymmetric subversion attacks; Splittable signature; Undetectability; Key recovery; ENCRYPTION;
D O I
10.1007/978-3-319-93638-3_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Subversion attacks against cryptosystems have already received wide attentions since several decades ago, while the Snowden revelations in 2013 reemphasized the need to further exploring potential avenues for undermining the cryptography in practice. In this work, inspired by the kleptographic attacks introduced by Young and Yung in 1990s [Crypto'96], we initiate a formal study of asymmetric subversion attacks against signature schemes. Our contributions can be summarized as follows. - We provide a formal definition of asymmetric subversion model for signature schemes. Our asymmetric model improves the existing symmetric subversion model proposed by Ateniese, Magri and Venturi [CCS'15] in the sense that the undetectability is strengthened and the signing key recoverability is defined as a strong subversion attack goal. - We introduce a special type of signature schemes that are splittable and show how to universally mount the subversion attack against such signature schemes in the asymmetric subversion model. Compared with the symmetric attacks introduced by Ateniese, Magri and Venturi [CCS'15], our proposed attack enables much more efficient key recovery that is independent of the signing key size. Our asymmetric subversion framework is somewhat conceptually simple but well demonstrates that subversion attacks against signature schemes could be quite practical, and thus increases awareness and spurs the search for deterrents.
引用
收藏
页码:376 / 395
页数:20
相关论文
共 27 条
[1]  
[Anonymous], 1997, Handbook of Applied Cryptography
[2]   Subversion-Resilient Signature Schemes [J].
Ateniese, Giuseppe ;
Magri, Bernardo ;
Venturi, Daniele .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :364-375
[3]  
Ball J, 2013, GUARDIAN
[4]   Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks [J].
Bellare, Mihir ;
Jaeger, Joseph ;
Kane, Daniel .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1431-1440
[5]  
Bellare M, 2014, LECT NOTES COMPUT SC, V8616, P1, DOI 10.1007/978-3-662-44371-2_1
[6]  
Boneh D., 2011, Encyclopedia of Cryptography and Security, P347, DOI [10.1007/978-1-4419-5906-5_145, DOI 10.1007/978-1-4419-5906-5_145]
[7]   Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions [J].
Chen, Rongmao ;
Mu, Yi ;
Yang, Guomin ;
Susilo, Willy ;
Guo, Fuchun ;
Zhang, Mingwu .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 :844-876
[8]   Message Transmission with Reverse Firewalls-Secure Communication on Corrupted Machines [J].
Dodis, Yevgeniy ;
Mironov, Ilya ;
Stephens-Davidowitz, Noah .
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 :341-372
[9]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[10]  
Fischlin M., 2017, IACR CRYPTOLOGY EPRI, V2017, P984