ALL Metrics
-
Views
-
Downloads
Get PDF
Get XML
Cite
Export
Track
Review

Digital signature schemes with strong existential unforgeability

[version 1; peer review: 2 approved]
PUBLISHED 16 Sep 2021
Author details Author details
OPEN PEER REVIEW
REVIEWER STATUS

This article is included in the Research Synergy Foundation gateway.

Abstract

Digital signature schemes (DSS) are ubiquitously used for public authentication in the infrastructure of the internet, in addition to their use as a cryptographic tool to construct even more sophisticated schemes such as those that are identity-based. The security of DSS is analyzed through the existential unforgeability under chosen message attack (EUF-CMA) experiment which promises unforgeability of signatures on new messages even when the attacker has access to an arbitrary set of messages and their corresponding signatures. However, the EUF-CMA model does not account for attacks such as an attacker forging a different signature on an existing message, even though the attack could be devastating in the real world and constitutes a severe breach of the security system. Nonetheless, most of the DSS are not analyzed in this security model, which possibly makes them vulnerable to such an attack. In contrast, a better security notion known as strong EUF-CMA (sEUF-CMA) is designed to be resistant to such attacks. This review aims to identify DSS in the literature that are secure in the sEUF-CMA model. In addition, the article discusses the challenges and future directions of DSS. In our review, we consider the security of existing DSS that fit our criterion in the sEUF-CMA model; our criterion is simple as we only require the DSS to be at least secure against the minimum of existential forgery. Our findings are categorized into two classes: the direct and indirect classes of sEUF-CMA. The former is inherently sEUF-CMA without any modification while the latter requires some transformation. Our comprehensive  review contributes to the security and cryptographic research community by discussing the efficiency and security of DSS that are sEUF-CMA, which aids in selecting robust DSS in future design considerations.

Keywords

Cryptography, Digital Signatures, Strong Existential Unforgeability

Introduction

The idea of a digital signature scheme (DSS) was proposed by Diffie and Hellman in 1976 as a necessity to design efficient authenticated electronic communications which can serve as legal evidence in the court of law.1 Rivest, Shamir, and Adleman realized the idea in their seminal work known as the RSA cryptosystem,2 the first of many. A DSS consists of three processes, as shown in Figure 1.

c5518a46-046c-4d16-9141-b5beae7c1783_figure1.gif

Figure 1. The three processes of a digital signature scheme and the relationship between the input/outputs.

For every (sk,pk) ← keygen(1k) and every m, verify(sign(m,sk),m,pk) = 1 must hold. A σ on m is valid if verify(σ,m,pk) = 1. This is a standard (informal) definition of DSS.3 In the early 90s, a paradigm known as hash-then-sign forms the industry standard for issuing digital signatures.4 The idea is to sign on the hash of a message, hH(m) instead of the m itself; this has a few benefits for h is constant size, which leads to efficient signing on speed and a constant sized signature. Verification would then require the verifiers to first validate the signed hash, then perform hashing hH(m) before finally comparing h′ and h. Concrete examples of the hash-then-sign are discussed in.5-15

Properties of DSS

The following properties are required by DSS3:

  • Public verifiability: A signature σ generated from a private key sk can be verified using a public key pk. This property differentiates DSS from other integrity protection mechanisms, such as message authentication codes (MAC). A consequential result from this property is that signatures are also transferrable, meaning a party can copy σ and pk to use it to convince others that the message is authentic from the signer.

  • Non repudiation: A signer cannot later deny that they have authenticated a message m once the signature of m, σ is generated and known. This is also another property that separates DSS from MAC, because the only entity that could have plausibly generated the signature in the case of DSS must possess the private key sk; whereas in a MAC scheme, the keys are shared. This property also implies that only the one in posession of sk can generate valid signatures, which disallows forgeries.

Message recovery

Notice that the verification process requires both the message and the signature as inputs, requiring the signer to transmit both. Alternatively, some DSS can support message recovery. DSS with message recovery (DSS-R) has a different sign and verification process, shown in Figure 2; the signer only needs to transmit a packed signature ρ, and the verifier would recover the message m successfully or abort ⊥ depending on signature validity. For practical purposes, |ρ|≤|σ| + |m|. Examples of DSS-R are found in previous literature.16-23

c5518a46-046c-4d16-9141-b5beae7c1783_figure2.gif

Figure 2. Sign and verify process for a digital signature scheme with message recovery.

Security models

The security of DSS was first formalized by Goldwasser, Micali and Rivest in 1988.24 Different security goals are used to model the different security guarantees of a DSS when faced with an adversary. The commonly accepted goal to model against is the goal of existential forgery (EUF), which is the easiest for attackers to achieve among other goals (e.g., selective forgery, total break). In addition,24 defined the adversarial capabilities for a DSS, which aims to model what types of attacks can be carried out by an adversary when attempting to break the DSS. The strongest capability, known as adaptive chosen message (CMA) is the widely accepted adversarial capability that is the most used in the literature on DSS. Figure 3 shows the interactions of a challenger and an adversary in the EUF-CMA model. In step (1), the challenger sets up an empty set Q and gives the pk to the adversary. In step (2), the adversary may make oracle queries that model its chosen message attack capability. The queried messages are added to the set Q. In step (3), the adversary announces to the challenger the target message m* it wants to forge. m* must not be an element of Q, nor it can be queried to the oracle; this prevents trivial attacks which uses the oracle to break the security goal. Note, step (4) allows the adversary to use the signing oracle again, which models the adaptive nature of the attack. Finally, in step (5), the adversary outputs a forgery σ*. We say the adversary breaks the DSS if σ* on m* is valid. qs quantifies the number message-signature pair made available to the adversary.

c5518a46-046c-4d16-9141-b5beae7c1783_figure3.gif

Figure 3. EUF-CMA security model.

Strong existential unforgeability (sEUF-CMA)

Consider the case for randomized signatures in the EUF-CMA model (e.g., DSA13 or PSS-R18). A randomized DSS allows multiple valid signatures for a single message, which has a subtle implication on the model: Suppose that the adversary queried for a message-signature pair (m,σ). Now, the adversary forges a different valid signature σ′ ≠ σ on the same message m. This is an easier security goal, but could be a critical vulnerability when the DSS is used in a scenario in which the designers assumed that no new signatures can be forged, because a different signature on an existing message is still new. In other words, EUF-CMA does not guarantee that if that an attacker knows (m,σ), it cannot forge (m,σ′) such that σ′ on m is valid. This gave rise to a stronger security model, known as strong existential unforgeability or sEUF-CMA.25 Figure 4 shows the interactions of the adversary with the challenger in the sEUF-CMA model. The main difference is the constraint during the chosen message attacks and in the final step (5). Notably, the adversary can even query for signatures on the challenge message m*, but may not submit any of the signatures obtained from the sign oracle as forgeries. In contrast to EUF-CMA, sEUF-CMA ensures that an adversary cannot produce any new signatures at all; any valid signature must have originated from the signer.

c5518a46-046c-4d16-9141-b5beae7c1783_figure4.gif

Figure 4. sEUF-CMA security model.

Why does sEUF-CMA matter?

Let’s take a step back and consider why sEUF-CMA is even worth considering in the first place. DSS is very often used as a building block to construct other cryptographic schemes. For example, using the Fiat-Shamir transform,26 a DSS can be turned into an identification protocol. DSS has also been used to create identity-based identification schemes,27 signcryption schemes,25 authenticated key exchanges,28 and identity-based encryption schemes.29 DSS with EUF-CMA security is found to be insufficient in some of the constructions, particularly to build non-malleable cryptographic schemes. In a nutshell, non-malleability refers to the impossibility of an adversary to generate a different ciphertext to some previously known ciphertext that decrypts to the same message, which is a desirable property in cryptographic schemes.30 Thus, if a DSS is sEUF-CMA, it is much more versatile because it can be useful as a building block for many of the schemes which requires the property of non-malleability.

A simple attack for when a DSS is not sEUF-CMA

We show a toy example of a simple attack that can be achieved by an attacker if the DSS used for authentication is not sEUF-CMA. Figure 5 shows honest users Alice and Bob, as well as an attacker Mallory which has hijacked the channel. In step (1), Bob wants to authenticate that Alice is truly on the other end. Mallory launches a chosen message attack in step (2) and (3) on Alice and obtains the message m and signature σ. In step (4), Mallory forwards (m,σ) to Bob, which may initially convince them. After some time elapsed, Bob wants to re-authenticate Alice to ensure that they are still who they claim to be (5). Mallory forges a valid signature σ′ ≠ σ on m and forwards that to Bob (6). From Bob’s perspective, Alice generating a different signature ought to warrant some confidence that Alice is truly Alice. However, if the DSS is not sEUF, this is not the case, as Bob is obviously duped.

c5518a46-046c-4d16-9141-b5beae7c1783_figure5.gif

Figure 5. A simple problem on a digital signature schemes without sEUF-CMA.

Real life problems arising from signature malleability (non-sEUF)

We established sEUF-CMA is of theoretical interest. Here we briefly mention a few real-life needs for sEUF-CMA to emphasize the importance of it. Not too long ago, Stern et al. showed how to duplicate ECDSA signatures based on their malleability.31 A more recent example is the transaction malleability of the popular cryptocurrency, Bitcoin. When a transaction in Bitcoin is signed, the signature does not cover the entire transaction used for hashing; an attacker could perform strong forgery (i.e., maul the signature), then claim that the transaction has failed (because the hash is not valid). The sender would believe it because the signature is valid! This leads to the sender issuing a new transaction, without knowing that the original transaction is valid.32,33 Decker and Wattenhofer pointed out that this subtle flaw could be responsible for a small portion of Bitcoins stolen during the 2014 MtGox attack.34 They remarked that transaction malleability should be carefully considered when implementing Bitcoin clients. In another research, Jackson et al. found that signatures that are not sEUF-CMA may cause the strong session agreement of a well-known authenticated key exchange algorithm, the STS-ISO1 to fail.36 They analyzed STS-ISO using the Tamarin Prover and found that if sEUF is violated, attackers can force the parties in the session to accept message that do not originate from either of the honest parties.

DSS secure in sEUF-CMA

The notion of sEUF-CMA first appeared in the form of non-malleability of ciphertexts in the works of Dolev, Dwork and Naor30 in 1991. The term sEUF-CMA was first introduced by An, Dodis and Rabin which presented it as requirement to construct signcryption schemes.25 Boneh, Shen and Waters were the first DSS that is considered and proven in the sEUF-CMA model,37 but mentions that DSS that are sEUF-CMA have existed earlier such as full domain hash (FDH)-RSA.18 FDH-RSA must be sEUF-CMA because the signatures generated are determined exactly by the message only. This means that FDH-RSA signatures are deterministic. For deterministic signatures, a strong forgery cannot occur without the message m′ being different from the original m, therefore, deterministic signatures are generally sEUF-CMA. We see that this is also the case for the widely used and popular EdDSA which had recently received a provable security treatment.38 Boneh, Shen and Waters shows that non-deterministic signatures may also exhibit sEUF-CMA, such as the Micali-Reyzin signatures,39 Goh-Jarecki signatures40 and Boneh-Boyen signatures.11 The reason for this is that if the forger manages to re-randomize a signature on the same message, the signature constitutes an existential forgery through clever binding of the messages. This is a recurring paradigm to design sEUF-CMA signature schemes.11,41 Since the introduction of the sEUF-CMA model, existing EUF-CMA secure DSS are now re-considered in the sEUF-CMA model. An example of such work is by Fersch, Kiltz and Poettering on the well established DSA.13 DSA was shown to be secure under sEUF-CMA, while ECDSA was not2.43 More recently in 2021, Brendel et al. proved the IETF version of EdDSA to be sEUF-CMA secure.38 Table 1 shows a list of DSS that are secure under sEUF-CMA.

Table 1. DSS that are directly sEUF-CMA.

SchemeReq.Sec. AssumpSign CostVer. CostSig. len.M.R.Std.
Lamport44N/A1-way functions|1k| hash/0|1k| hash|m|×|hash(⋅)|
DSA13,43random oracleDLP0/exex2|q|
FDH-RSA18random oracleRSA0/exex|n|
CS9945N/AStrong RSA0/4ex4ex3|n|
BLS019random oracleGDH0/expair|G|
BMS0346N/ACDHex(log2nm)/ex(pair + ex)( log2nm+1)(log2nm+1)|G|
GJ0347random oracleDDH0/2ex2ex2|q|
KW0347random oracleRSA0/exex|n|
BB0411N/AStrong DH0/expair|G|+|q|
mNR0448,49N/AGGM0/ex2ex2|q|
GJK +07-150random oracleCDH0/3ex2exG— + 2|q| + 1
GJK +07-250random oracleDDH2ex/02ex2|q|
TP0951random oracleRSA & DLP0/2ex3ex2|n|
AGH +1152N/AGGM0/(2+kmn)ex(kmn)pair3|G|
EdDSA38,53random oracleECDLP0/2ex2ex2|G|
NTC1954random oracle1-way trapdoor sampleable relations0/2ex2ex|G|+1

Message recovery

From another perspective, we consider DSS with message recovery (DSS-R) candidates under sEUF-CMA. As pointed out by Ateniese and de Mediros, the modified Nyberg-Rueppel signature is sEUF-CMA secure.49 While it is tempting to think that DSS-R must be sEUF-CMA, because modifying the signature will surely modify the message itself given that one can recover the message from the signature. However, we see that this is not the case as Ateniese and de Mediros found the original Nyberg-Rueppel signatures49 to be insecure in sEUF-CMA.

Conversions to sEUF-CMA

Boneh, Shen and Waters opened a new field in the research of DSS under sEUF-CMA: Interest in sEUF-CMA conversion starts to accumulate with various works being published.41,56-58 Instead of working on individual DSS, the line of research focuses on creating efficient conversions to enhance existing generic DSS with EUF-CMA into sEUF-CMA. Some transforms do not even need EUF-CMA security at minimum, only requiring EUF-GMA, which is a weaker notion than EUF-CMA.59,60 Table 2 shows a list of conversion methods since 2006, including the use of DSS in leakage resilient settings.61-64

Table 2.

Conversions that produces DSS with sEUF-CMA.

SchemeDSS Req.Add. Req.Sec. AssumpSign CostVer. CostSig. len.Std.
MR0039factoring-based Fiat-Shamirrandom oracleinteger fact.0/2ex2ex2|q|
BSW0637EUF-CMA, partitionedrandomized trapdoorCDH + trapdoor0/sg + ex + tdvf + ex + td|σ| + |q|
TOO06-156EUF-CMArandom oracleDLPsg + ex/0vf + ex|σ| + |q|
TOO06-256EUF-CMAcollision resistant hashDLP + collision resistsg + ex/0vf + ex|σ| + 2|q|
SPW0757EUF-CMAstrong randomized trapdoortrapdoor0/sg + 2tdvf + 2td|σ| + |q|
BS0741EUF-CMA2-tier DSSEUF-CMA of 2-tier DSS0/2sg + kg2vf2|σ| + |pk|
Goldreich65EUF-CMA1-time DSSstrong 1-time EUF DSSsg(log2nm)/sgvf(log2nm + 1)(log2nm)(|σ| + |pk|)
HWZ0758EUF-CMA1-time DSSstrong 1-time EUF DSSsg + kg/sg2vf2|σ| + |pk|
LKZ + 08-S59EUF-GMA, deterministicN/AN/Asg + kg/sg2vf2|σ| + |pk|
LKZ + 08-P59EUF-GMA, deterministicN/AN/Asg/sg2vf2|σ| + |1k|
LAS + 1060EUF-GMA/CMAGTOW chameleon hashone-wayness of GTOW hashsg/tdvf + td|σ| + |q|
DSS with leakage resilience under sEUF-CMA
KV09-2.161Lamport DSS1-time use 1-way functions|1k| hash/0|1k| hash|m|×|hash(⋅)|
WT1462EUF-FLRstrong randomized trapdoortrapdoor leakage resilience0/sig + 2tdvf + 2td|σ| + |q|
WT1563EUF-FLRstrong randomized trapdoortrapdoor leakage resilience0/sig + 2td + pair + exvf + 2td|σ| + |q| + |G| + |π|
HHP1664EUF-FLR1-time EUF-FLR DSSstrong 1-time EUF-FLR DSSsg + kg/sig2vf2|σ| + |pk|

DSS Req. - Requirement for DSS before using the conversion; Add. Req. - Additional requirements; EUF-GMA - Existential Unforgeability under Generic Chosen Message Attack; GTOW - Given Target One-Wayness (See60); EUF-FLR - Existential Unforgeability with Full Leakage Resilience; sg - signature generation cost; td - trapdoor operation cost; kg - key generation cost; 1k - security parameter; vf - signature verification cost; σ - underlying signature length; pk underlying signature public key length; π - Groth-Sahai proof statement (See66).

Widely used DSS that have malleable signatures

Through our research, we investigated some of the most used DSS in the industry on their security in the sEUF-CMA model. The following are the popular DSS that are not sEUF-CMA secure.

  • 1. RSA PKCS#1.567

  • 2. ECDSA31,43

  • 3. Ed25519 (Original, not IETF RFC 8032)38

Challenges and future direction

In recent work, there has been several post-quantum cryptographic DSS that incorporates the sEUF-CMA model during design.68-71 DSS in various other contexts (e.g., privacy preserving computation, multiparty computation) such as a homomorphic DSS,72 group DSS,73 and proxy DSS74-76 are being considered in sEUF-CMA as well. In addition, DSS in even more complex cryptographic settings such as in certificateless and identity-based settings are also using sEUF-CMA as their standard model for security.77-80 We see that the security goal post has been moved from EUF-CMA to sEUF-CMA in the span of a decade and believe this is the right direction forward as DSS is increasingly used in intricate security protocols, which cannot tolerate any design flaw that arises from as simple as malleable signatures.

Conclusion

In this work, we provided a comprehensive review on what is strong unforgeability in DSS, why is it needed, which of the DSS are secure under the model and how to obtain it if the DSS is only existentially unforgeable. We surveyed and analyzed existing DSS in literature which are secure under sEUF-CMA, and noted the requirements, computational and storage efficiency as well as the security assumptions of each DSS to provide an overview of DSS under the much more secure model.

Data availability

No data is associated with this article.

Comments on this article Comments (0)

Version 1
VERSION 1 PUBLISHED 16 Sep 2021
Comment
Author details Author details
Competing interests
Grant information
Copyright
Download
 
Export To
metrics
Views Downloads
F1000Research - -
PubMed Central
Data from PMC are received and updated monthly.
- -
Citations
CITE
how to cite this article
Chia J, Chin JJ and Yip SC. Digital signature schemes with strong existential unforgeability [version 1; peer review: 2 approved]. F1000Research 2021, 10:931 (https://doi.org/10.12688/f1000research.72910.1)
NOTE: If applicable, it is important to ensure the information in square brackets after the title is included in all citations of this article.
track
receive updates on this article
Track an article to receive email alerts on any updates to this article.

Open Peer Review

Current Reviewer Status: ?
Key to Reviewer Statuses VIEW
ApprovedThe paper is scientifically sound in its current form and only minor, if any, improvements are suggested
Approved with reservations A number of small changes, sometimes more significant revisions are required to address specific details and improve the papers academic merit.
Not approvedFundamental flaws in the paper seriously undermine the findings and conclusions
Version 1
VERSION 1
PUBLISHED 16 Sep 2021
Views
10
Cite
Reviewer Report 13 Feb 2023
Pin Shen Teh, Manchester Metropolitan University, Manchester, UK 
Approved
VIEWS 10
  • The research objective was clear.
     
  • The concept of the work was straightforward.
     
  • The presentation style of the article was clear.
     
  • Grammar mistakes
... Continue reading
CITE
CITE
HOW TO CITE THIS REPORT
Teh PS. Reviewer Report For: Digital signature schemes with strong existential unforgeability [version 1; peer review: 2 approved]. F1000Research 2021, 10:931 (https://doi.org/10.5256/f1000research.76522.r162696)
NOTE: it is important to ensure the information in square brackets after the title is included in all citations of this article.
Views
12
Cite
Reviewer Report 03 Nov 2021
Denis Chee-Keong Wong, Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul Rahman, Kampar, Malaysia 
Approved
VIEWS 12
The paper performs a review on existing DSS together with its properties, such as public verifiability, non-repudiation, and ability for message recovering. Furthermore, a detailed discussion on DSS security models are included, which are the EUF-CMA and sEUF-CMA. The differences ... Continue reading
CITE
CITE
HOW TO CITE THIS REPORT
Wong DCK. Reviewer Report For: Digital signature schemes with strong existential unforgeability [version 1; peer review: 2 approved]. F1000Research 2021, 10:931 (https://doi.org/10.5256/f1000research.76522.r97082)
NOTE: it is important to ensure the information in square brackets after the title is included in all citations of this article.

Comments on this article Comments (0)

Version 1
VERSION 1 PUBLISHED 16 Sep 2021
Comment
Alongside their report, reviewers assign a status to the article:
Approved - the paper is scientifically sound in its current form and only minor, if any, improvements are suggested
Approved with reservations - A number of small changes, sometimes more significant revisions are required to address specific details and improve the papers academic merit.
Not approved - fundamental flaws in the paper seriously undermine the findings and conclusions
Sign In
If you've forgotten your password, please enter your email address below and we'll send you instructions on how to reset your password.

The email address should be the one you originally registered with F1000.

Email address not valid, please try again

You registered with F1000 via Google, so we cannot reset your password.

To sign in, please click here.

If you still need help with your Google account password, please click here.

You registered with F1000 via Facebook, so we cannot reset your password.

To sign in, please click here.

If you still need help with your Facebook account password, please click here.

Code not correct, please try again
Email us for further assistance.
Server error, please try again.