2020
DOI: 10.1016/j.tcs.2020.03.021
|View full text |Cite
|
Sign up to set email alerts
|

Subversion-resilient signatures: Definitions, constructions and applications

Abstract: We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Our model of subversion generalizes previous work in several directions, and is inspired by the proliferation of software attacks (e.g., malware and buffer overflow attacks), and by the recent revelations of Edward Snowden about intelligence agencies trying to surreptitiously sabotage cryptographic algorithms. The main security requirement we put forward demands that a signature scheme should remain unforgeable ev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 46 publications
(62 reference statements)
0
11
0
Order By: Relevance
“…Ateniese et al show that if a digital signature scheme Σ is unique or rerandomizable then there are very efficient reverse firewalls for Σ [6]. Our firewalled signing protocol is a reverse firewall for ECDSA, which is neither unique nor rerandomizable.…”
Section: Related Workmentioning
confidence: 91%
See 1 more Smart Citation
“…Ateniese et al show that if a digital signature scheme Σ is unique or rerandomizable then there are very efficient reverse firewalls for Σ [6]. Our firewalled signing protocol is a reverse firewall for ECDSA, which is neither unique nor rerandomizable.…”
Section: Related Workmentioning
confidence: 91%
“…The innovation is that our protocol outputs unmodified ECDSA signatures, which is critical for backwards compatibility. In Section 9, we explain how our construction relates to subliminal-free [44,45,46,108,109] and subversion-resistant signature schemes [6].…”
Section: Introductionmentioning
confidence: 99%
“…The cryptographic reverse firewall is a generic way to prevent a tampered machine from leaking information to BB via any scheme. And the cryptographic reverse firewalls [20]- [22] mainly targeted at the protection of the public-key schemes. According to the results in [20], the improved asymmetric subversion model for signature and identification [23], [24] is further presented.…”
Section: B Related Workmentioning
confidence: 99%
“…State-of-the-art literature suggests two pathways to evade ASA: 1) design of subversion-resilient algorithms and 2) detection. Subversion-resilient design of cryptography algorithms were proposed in [10], [11]. Designing subversion-resilient algorithms requires cryptanalysis of the algorithm.…”
Section: Introductionmentioning
confidence: 99%