Paper 2023/380

Security Analysis of Signature Schemes with Key Blinding

Edward Eaton, National Research Council Canada
Tancrède Lepoint, Amazon Web Services
Christopher A. Wood, Cloudflare
Abstract

Digital signatures are fundamental components of public key cryptography. They allow a signer to generate verifiable and unforgeable proofs---signatures---over arbitrary messages with a private key, and allow recipients to verify the proofs against the corresponding and expected public key. These properties are used in practice for a variety of use cases, ranging from identity or data authenticity to non-repudiation. Unsurprisingly, signature schemes are widely used in security protocols deployed on the Internet today. In recent years, some protocols have extended the basic syntax of signature schemes to support key blinding, a.k.a., key randomization. Roughly speaking, key blinding is the process by which a private signing key or public verification key is blinded (randomized) to hide information about the key pair. This is generally done for privacy reasons and has found applications in Tor and Privacy Pass. Recently, Denis, Eaton, Lepoint, and Wood proposed a technical specification for signature schemes with key blinding in an IETF draft. In this work, we analyze the constructions in this emerging specification. We demonstrate that the constructions provided satisfy the desired security properties for signature schemes with key blinding. We experimentally evaluate the constructions and find that they introduce a very reasonable 2-3x performance overhead compared to the base signature scheme. Our results complement the ongoing standardization efforts for this primitive.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
signaturesre-randomizable keyskey blindingprotocol standardsEd25519ECDSA
Contact author(s)
edward eaton @ nrc-cnrc gc ca
tlepoint @ amazon com
caw @ heapingbits net
History
2023-03-16: approved
2023-03-15: received
See all versions
Short URL
https://ia.cr/2023/380
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/380,
      author = {Edward Eaton and Tancrède Lepoint and Christopher A. Wood},
      title = {Security Analysis of Signature Schemes with Key Blinding},
      howpublished = {Cryptology ePrint Archive, Paper 2023/380},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/380}},
      url = {https://eprint.iacr.org/2023/380}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.