### BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures

##### Abstract

Modern digital signature schemes can provide more guarantees than the standard notion of (strong) unforgeability, such as offering security even in the presence of maliciously generated keys, or requiring to know a message to produce a signature for it. The use of signature schemes that lack these properties has previously enabled attacks on real-world protocols. In this work we revisit several of these notions beyond unforgeability, establish relations among them, provide the first formal definition of non re-signability, and two generic transformations that can provide these properties for a given signature scheme in a provable and efficient way. Our results are not only relevant for established schemes: for example, the ongoing NIST PQC competition towards standardizing post-quantum signature schemes had six candidates in its third round of which three are to be standardized. We perform an in-depth analysis of all the candidates with respect to their security properties beyond unforgeability. We show that many of them do not yet offer these stronger guarantees, which implies that the security guarantees of these post-quantum schemes are not strictly stronger than, but instead incomparable to, classical signature schemes. We show how applying our transformations would efficiently solve this, paving the way for the standardized schemes to provide these additional guarantees and thereby making them harder to misuse.

Note: Version 1.3 - January 2023: – Added BUFF-lite transformation (Theorem 5.1), which achieves M-S-UEO and MBS based on collision resistance, while retaining EUF-CMA unconditionally. – Added more discussion on the subtleties of the different transformations and the (im)possibility of generically excluding weak keys (Section 5) – Added Section 1.4 on the dissemination of the work, i.e., how our work has impacted the NIST PQC process and its candidates. – Recommended an algorithm identifier for the implementation (end of Section 5) to avoid cross-algorithm attacks – Rephrased Φ-non-malleability (Definition 2.4) to allow for more precise treatment of NR of the BUFF transformation (proof of Lemma 5.7)

##### Metadata
Available format(s)
Category
Public-key cryptography
Publication info
Published elsewhere. IEEE Symposium on Security and Privacy (S&P 2021)
Keywords
Digital signature schemeexclusive ownershipDSKS attacknon re-signabilitymessage-bound signaturesNIST PQC candidates
Contact author(s)
cremers @ cispa de
samed duzlu @ ur de
rune fiedler @ cryptoplexity de
marc fischlin @ cryptoplexity de
christian janson @ cryptoplexity de
History
2023-01-16: last of 3 revisions
2020-12-08: received
See all versions
Short URL
https://ia.cr/2020/1525
License

CC BY

BibTeX

@misc{cryptoeprint:2020/1525,
author = {Cas Cremers and Samed Düzlü and Rune Fiedler and Marc Fischlin and Christian Janson},
title = {BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures},
howpublished = {Cryptology ePrint Archive, Paper 2020/1525},
year = {2020},
note = {\url{https://eprint.iacr.org/2020/1525}},
url = {https://eprint.iacr.org/2020/1525}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.