Autotomic signatures

  • Authors:
  • David Naccache;David Pointcheval

  • Affiliations:
  • Département d'informatique, Groupe de cryptographie, École normale supérieure, Paris Cedex 05, France;Département d'informatique, Groupe de cryptographie, École normale supérieure, Paris Cedex 05, France

  • Venue:
  • Cryptography and Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Digital signature security is classically defined as an interaction between a signer , a verifier and an attacker $\mathcal{A}$. $\mathcal{A}$ submits adaptively to a sequence of messages m1,…,mq to which replies with the signatures U={σ1,…,σq}. Given U, $\mathcal{A}$ attempts to produce a forgery, i.e. a pair (m′,σ′) such that and $\sigma'\not\in U$. The traditional approach consists in hardening against a large query bound q. Interestingly, this is one specific way to prevent $\mathcal{A}$ from winning the forgery game. This work explores an alternative option. Rather than hardening , we weaken $\mathcal{A}$ by preventing him from influencing 's input: upon receiving mi, will generate a fresh ephemeral signature key-pair , use to sign mi, erase , and output the signature and a certificate on computed using the long-term key . In other words, will only use his permanent secret to sign inputs which are beyond $\mathcal{A}$'s control (namely, freshly generated public-keys). As the are ephemeral, q=1 by construction. We show that this paradigm, called autotomic signatures, transforms weakly secure signature schemes (secure against generic attacks only) into strongly secure ones (secure against adaptively chosen-message attacks). As a by-product of our analysis, we show that blending public key information with the signed message can significantly increase security.