Open Access
Issue
Wuhan Univ. J. Nat. Sci.
Volume 27, Number 1, March 2022
Page(s) 17 - 25
DOI https://doi.org/10.1051/wujns/2022271017
Published online 16 March 2022

© Wuhan University 2022

Licence Creative CommonsThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

0 Introduction

Since the first computer was intruded, hackers have been developing the technology of “backdoor” which allows them to enter the system again. The main functions of the backdoor is that it has no ability to prevent the system manager from entering this system again and discover these hackers. Many techniques have been used in this “backdoor”, such as intercepting postal shipping to steal and substitute networking hardware, sabotaging Internet routers, injecting malware, installing backdoors, wire-tapping undersea cables and so on [1-3].

In 2013, Edward Snowden brought shocking news that many ongoing surveillance programs with an underlying “backdoor” target at citizens conducting by National Security Agency (NSA) and partners from all over the world [4]. A typical example is a pseudorandom generator (PRG) named Dual_EC_ DRBG backdoored by NSA, from NIST (National Institute of Standards and Technology). After choosing a few concrete parameters employed in the PRG, an attacker or any adversary is not able to differentiate exports on PRG from any random number but can forecast following exports[5]. In this circumstances, post-Snowden cryptography attracts much of attentions in recent years.

As one of the research topics in post-Snowden cryptography, the notion of algorithm substitution attack (ASA) was formalized by Bellare et al[6] in some semantics from algorithms named symmetric encryption algorithms. The ASA method is capable of any attacker or old big brother to substitute a few of pieces of randomized encryption algorithms or signature algorithms with a modified one such that it can leak secret keys subliminally and undetectably to the adversary. Ateniese et al[7] first proposed a model of ASA on signature schemes, however, the subverted signature is generic and inefficient. Then Liu et al[8] introduced a much high efficient ASA method about one affirmatory crowd in some signature schemes. Recently, Beak et al[9] presented a much more efficient and undetectable method ASA from a classical DSA (digital signature algorithm) digital signature. At present most proposed subverted signatures only consider how to subvert signature schemes, there still needs some countermeasures to address big brother’s threat, while a new proposed signatures named double authentication preventing signatures can be used to deter this kind of big brother’s action.

The double authentication preventing signatures (DAPS) are a class of extraordinary digital signatures with double signatures extractability which means deterable when there exist two different signatures from messages (m0, p1) and (m0, p2), where p1p2. When a signature is subverted and satisfies double signature extractability, the subverted signature can be deterable by revealing real signature’s signing secret keys to anyone. Unlike these two ring signatures with linkability and traceability[10-13], our DAPRS (double authentication preventing ring signatures) has stronger accountability which leads any two pairs of signatures produced by same member in a ring set to reveal his (or her) secret signing keys. As for linkable ring signatures, it allows anyone to efficiently decide whether any two pairs of signatures are produced by the same member without revealing his (or her) identity. As for traceable ring signatures, it can reveal his (or her) identity if any two signatures are produced by the same member. On the basis of the digital signatures in Refs. [14-16], most designed DAPS based on discrete logarithm problems and large integer factorization problems face new challenges because there exist polynomial computational complexity quantum algorithms to solve the two problems, such as Shor algorithm[17,18]. Hence, it is necessary to study some post quantum secure DAPS.

Lattice-based signature is a cutting-edge cryptographic “technology”. It has several interesting properties, such as high computational efficiency, novel and powerful cryptographic functionalities/applications, strong provable security guarantees, believed “post-quantum” security and so on. Therefore, it is vital for us to study some lattice-based algorithm substitution attacks. While most efficient lattice-based signatures which are a promising post-quantum cryptography belong to Fiat-Shamir signature paradigms (e.g., BLISS[19,20], GLP[21], PASSSign[22], Ring-TESLA[23]) and Hash-and-sign paradigms (e.g., GGH[24], NTRUSign[25], GPV[25]) at the NIST workshop on post-quantum cryptography. Lattice-based Hash-and-sign paradigm follows that a trapdoor function can be provided by a short lattice basis. Most of them are heuristic security (no actual security proofs) and are relatively inefficient than lattice-based Fiat-Shamir (FS) signature paradigms[26]. Furthermore most lattice-based Hash-and-sign paradigms have unique signatures which are against subversion attacks[7]. Hence we aim at algorithm substitution attacks on FS lattice signature paradigms (FS-LBS). In this paper, we present ASA against those schemes that any three consecutive subverted signatures can extract signing keys. At the same time, we provide some countermeasures against ASA by using DAPS to deter the big brother’s threaten. And we show that our scheme can be applied to some practical architectures based on some concrete experiment analysis.

The remainder of this paper is organized in the following sequence. Section 1 shows some preliminaries and cryptographic knowledge. Section 2 provides some notions about deterable subverted signatures and some design requirements. Section 3 presents our concrete deterable subverted FS-LBS scheme and gives proof of key extraction, undetectability and deterability. In Section 4, we make some parameter analysis and performance evaluation. Finally, we give our conclusions.

1 Preliminaries

1.1 Notations

Some basic notations have been shown in Table 1.

Table 1

Notations

1.2 Cryptographic Problems on Lattices

Definition 1   (Ring-SISq,m,β[27,28]) Given m uniformly elements Riq at random and let a=(a1,,am), search a vector zm but not zero vector with the relation zβ satisfyingaz=0q

Note that in ring-SIS, each aiq corresponds to n related vectors aiZqn in SIS, where n is the degree of . Each zi of a ring-SIS solution corresponds to a block of n integers, that means aiZqm×m and zZm×m.

Definition 2   (Ring-LWE n,q,DR,σ[27,28]) Given m uniformly elements ai,biq at random and let a=(a1,,am)q,b=(b1,,bm)q, this algorithm is to search a vector sm satisfying b=as+e, here eDm,σ.

Definition 3   (Rejection sampling lemma [29-33])

Suppose that VZm. Let h:VR be a random distribution from a Hash value, and σ=ω(logm). If a constant M exists, the following distribution

1) vh

2) zDσm

3) Output (z,v) with probability of 1m and the below distribution

1) vh

2) zDv,σm

3) Output (z,v) with probability of min(Dσm(z)MDv,σm(z),1) is statistically indistinguishable within distance of 2-ω(logm)M. In the following, we use the RejectionSample to represent the algorithm.

1.3 Description of Lattice Based Fiat-Shamir Type Signature Schemes

The Fiat-Shamir type signatures based on lattice consist of algorithms in the following:

Key Generation:

1) Pick a at random.

2) Choose uniformly random s11,s21

3) Compute t=as1+s2

4) Output a pair of public key and secret key: (a,t);(s1,s2)

Sign (μ,a,s1,s2,t):

Select two random numbersy11,y21

2) Calculate w=ay1+y2

3) Compute a value c=H(a,t,w,μ)

4) Obtain z1=y1+cs1,z2=y2+cs2

5) Run the RejectionSample (z1,z2,cs1,cs2) and go to 1) if it rejects.

6) Output a pair of signature (c,z1,z2)

Verify (μ,a,z1,z2,t):

1) Check w=az1+z2ct mod q whether holds or not.

2) Accept if and only if the equation c=H(a,t,w,μ) and a small norm (z1,z2) holds.

Here 1 with tiny modulus is the subset of . Cryptographic Hash function H outputs a low norm subset of .

1.4 Double Authentication Preventing Signatures

A DAPS includes four probability polynomial time (PPT) algorithms (KGen, Sign,Ver, Extract) as follows:

1) Given a security parameter λ, the algorithm KGen(1λ) outputs public keys pk and private keys sk.

2) The algorithm Sign(sk, a, p) outputs a signature π on a pair of public/private key (pk, sk) and a subject/message pair (a, p).

3) The algorithm Ver(pk, a, p, π) outputs either 0 for rejection or 1 for acceptance on pk, (a, p) and π.

4) The algorithm Extract outputs the private key sk on input pk, (a1,p1),(a2,p2) and σ1,σ2, where a1=a2,p1p2.

A DAPS satisfies two properties of existential unforgeability under chosen message attack (EUF-CMA) and double signature deterability (DSE)[13].

2 Our Deterable Subverted Signatures

We first provide the threat model in this section. Then we give formal definitions for the syntax of deterable subverted signatures. Compared with regular deterable digital signatures, these schemes need a “extraction key” for their manipulates if there exists a subversion attack. Finally we provide some security and functionality features of a deterable subverted signatures on the basis Refs. [7-9].

2.1 Threat Model

Since authentication services of various system models and applications depend upon digital signatures, in the context coerced users who use a DAPS to design some court convincing signatures to refuse big brothers’ (or attackers’) requirements, we construct a subverted signature with a deterable function by using an algorithm substitution attack on double authentication preventing signatures.

2.2 Notions of Deterable Subverted Signatures

Definition 4   A deterable subverted signature SIG¯ for nonsubverted signature SIG includes four PPT algorithms as follows:

1) On inputting a security parameter l, this algorithm Gen¯ outputs a subversion key subk.

2) On inputting a subversion key subk, a state l, a private key sk, and a message μ, the algorithm SIG¯ outputs a subverted signature σ by an updated status l.

3) On inputting a message μ, a public key pk and a subverted signature σ, this algorithm Ver outputs 1 which means accept and outputs 0 which means reject.

4) On inputting a pair of colliding messages (μ1,μ2), a public key pk, and its corresponding non-subverted signatures σ1,σ2, this algorithm Deter outputs the private key sk.

2.3 Security and Functionality Features

The key extraction algorithm means that anyone including big brothers and attackers can compute the signature private key from known information if he or she makes a signature on a pair of colliding messages.

Definition 5   Assume that SIG=(Gen, Sign, Ver) is generic signature scheme and SIG¯=(Gen¯, SIG¯,Ver, Deter) is a deterable subverted signatures for SIG. Consider a key extraction game Keyextractionβ,SIG,SIG¯(l) as follows:

1) Using Gen(1l), it can generate a pair of (pk, sk).

2) By the algorithm Gen¯(1l), it can generate a subversion key subk.

3) For i=1,2,,QS,

Compute (σ¯i,li)SIG¯(subk,sk,μi,li1)

if an adversary ℬ queries every message μi

Return (σ¯i,li) to ℬ.

4) ℬ outputs sk by (pk,subk,{σ1,,σl})

5) Check the equation sk=sk whether holds or not. If it holds, return 1. Otherwise, it returns 0.

Define an advantageAdvB,SIG,SIG¯keyextract(l)=Pr[KeyextractionΒ,SIG,SIG¯(l)=1].

Given the private key sk and its corresponding public key pair pk, the functionality undetectability means that any users can not find the detecting subversion.

Definition 6   Assume that a general signature SIG=(Gen, Sign, Ver) and a deterable signatureSIG¯=(Gen¯, SIG¯, Ver, Deter)for SIG. Consider an undetectability game

DetectA,SIG,SIG¯(l) as follows:

1) Generate a pair of public/private key (pk,sk) by the algorithm Gen(1l).

2) By the algorithm Gen(1l), it can generate a subversion key subk.

3) Choose b{0,1} randomly, the game ASignOb(·),Reset(·)(sk, pk) outputs its guess b.

4) If bb, it returns 0, otherwise it returns 1.

SignOb(μi) is given as follows:

5) If b = 0, compute σiSign(sk,μi)

6) If b = 1, compute(σi,li)Sign¯(subk,sk,μi,li1)

7) Return σi

Reset(∙) is given as follows: Reset(rti) ∥ rti is a reset query.

Define advantageAdvA,SIG,SIG¯detect(l)=|Pr[DetectA,SIG,SIG¯(l)=1]12|

For any PPT adversary A, if there exists a negligible function ε(l) satisfyingAdvA,SIG,SIG¯detect(l)=|Pr[DetectA,SIG,SIG¯(l)=1]12|ε(l)the deterable subverted signature is undetectable. It means that the Ver algorithm can output some same results when it is a subverted signature or a normal signature on some same messages.

Deterability means that it can be deterred if there exists algorithm substitution attack on signature scheme.

Definition 7   Given a general signature SIG=(Gen,Sign,Ver) and a deterrable signature

SIG¯=(Gen¯, SIG¯, Ver, Deter) for SIG, the detera- bility game DeterC,SIG,SIG¯(l) is given as follows:

1) According to the algorithm Gen(1l), it generates a pair of public/private (pk, sk).

2) Run C(pk, sk), then generate (μ1,μ2,σ1,σ2).

3) Return 0 if μ1 and μ2 are not colliding.

4) viVer(pk,μi,σi) for i = 1, 2.

5) Return 0 if v1=0 or v2=0.

6) Run Deter(pk,μ1,μ2,σ1,σ2), then generate sk’.

7) Return 0 if sksk. Else return 1.

We define the advantageAdvC,SIG,SIG¯Deter(l)=Pr[DeterC,SIG,SIG¯(l)=1]

The advantage means that for any PPT adversary C, if there exists a negligible function ε(∙) satisfyingPr[DeterC,SIG,SIG¯(l)=1]12the deterable subverted signature is deterable. It means that our scheme can deter some signatures embedding backdoors.

3 Our Deterable Subverted Lattice Based Fiat-Shamir Type Signatures

This section introduces a self-enhancement or subverted attack on Fiat-Shamir type lattice signatures.

Our subverted Fiat-Shamir type lattice-based signatures (FS-LBS) are described as follows:

● Subverted key generation SIG¯FS-LBS: On inputting a security parameter l, a pseudo random Hash function F:{0,1}l×1 and a random number κ1,κ2{0,1}l, the algorithm Gen¯FS-LBS outputs κ1,κ2 and F which can be described as subk = (descF, κ1,κ2).

● Subverted sign Sign¯FS-LBS: On inputting public keys (a,t) of FS-LBS, message μ, private keys (s1,s2), subversion key subk and a state l=(j,τ), the algorithm outputs (σ¯,l) as follows.

j ← 0, τ← 0

If j=0 mod 2,

1) Select two random numbersy11,y21

2) Calculate w=ay1+y2

3) Compute a value c=H(A,t,w,μ)

4) Obtain z1=y1+cs1,z2=y2+cs2

5) Run the RejectionSample (z1,z2,cs1,cs2) and go to 1) if it rejects.

6) Let τ=c and σ¯=(c,z1,z2)

Else

7) Calculate w=ay1+y2

8) Compute a value c=H(A,t,w,μ)

9) Obtain z1=y1+cs1,z2=y2+cs2

10) Run RejectionSample (z1,z2,cs1,cs2) and go to 1) if it rejects.

11) Set τ=c and σ¯=(c,z1,z2)

j = j + 1

Let l=(j,τ)

Return ((σ¯,l)

Verify (μ,σ¯,a,t):

1) Check w=az1+z2ct mod q whether holds or not.

2) Accept if and only if the equation c=H(a,t,w,μ) and a small norm (z1,z2) hold.

If a FS-LBS scheme is subverted, the action of the signer can be found by revealing real signer’s signing secret keys to anyone. When the signing keys is vital for him, in some cases the signer will be punished or the signer will result in great economic losses, or there exist some court convincing reasons to deny big-brother or authority agency demands. Aiming at the subverted lattice-based Fiat-Shamir type signatures, we add a Deter algorithm. Our Deter algorithm makes sure that the lattice-based Fiat-Shamir type signature is against algorithm substitution attack.

● Deter

By the principle of DAPS, if there exists two FS-LBS signaturesσ1=(c1,z11,z12),σ2=(c2,z21,z22)

On colliding messages μ1 and μ2, respectively, anyone can obtain the signing secret key s1=z11z21c1c2 and s2=z12z22c1c2 by solving a linear equation respectively.

Then we present our scheme satisfying Key extraction, Undetectability and Deterability.

Key extraction. From the subverted FS-LBS FS-LBS¯, we show that the signing private keys of the FS-LBS can be extracted from the FS-LBS¯. That is to say, any consecutive FS-LBS¯ starting with odd or even index is able to release the signing private keys. Below we give the formal proof.

Theorem 1   Given subverted FS-LBS scheme FS-LBS¯ which outputs any three consecutive signatures, the signing private keys of FS-LBS can be revealed with probability 1.

Proof   Given three messages m,m,m, an adversary ℬ obtains three consecutive subverted FS-LBS σ¯j=(c,z1,z2), σ¯j+1=(c,z1,z2) and σ¯j+2=(c,z1,z2), respectively.

If j=0 mod 2, by using ℬ’s subversion keys subk (κ1,κ2,F), compute signing keys as follows:y1=F(κ1,c),y2=F(κ2,c),

Calculate w=ay1+y2

Compute a value c=H(A,t,w,μ)

s1=c1(z1y1) and s2=c1(z2y2)

Return s1,s2.

If j = 1 mod 2, j + 1 = 0 mod 2. ℬ chooses σ¯j+1=(c,z1,z2) and σ¯j+2=(c,z1,z2) to compute the signing keys s1,s2 by using the same method as above, so ℬ can compute the signing keys by the subverted signature algorithm Sign¯FS-LBS. Hence,AdvB,FS-LBS¯extract(λ)=1.

Undetectability. We show that our constructed subverted FS-LBS scheme FS-LBS¯ is undetectable by Theorem 2.

Theorem 2   Given subverted FS-LBS scheme FS-LBS¯, the detection advantage is negligible under the assumption of pseudo-random function (PRF) F.

Proof   By a sequence of games, we prove the theorem. We define the events Si(i=1,2,) of games Gi that is b=b.

Game 0. The original undetectability game DetectDetectA,FS-LBS,FS-LBS¯(λ).

Game 1   As before, but we modify Game 0 to use b = 0 for answering A’s queries as Game 0 and to use a uniform random string for substituting b = 1 (j = 1 mod 2) and noncomputed y1,y2 by PRF. A detailed description is given as follows.T.

If b=0, this game responds to a valid FS-LBS scheme and j = 0, τ= to A after receiving every signing query on m and a reset query rt , respectively.

If b = 1, this game carries on as follows:

When A does some signing queries on m,

j ←0, τ←0

If j = 0 mod 2

1) Pick y11,y21

2) Compute w=ay1+y2 and

3) Compute c=H(A,t,w,μ) and

4) Calculate z1=y1+cs1,z2=y2+cs2 and

5) Run the RejectionSample (z1,z2,cs1,cs2), and return 0 if it accepts.

6) Set τ=c and σ¯=(c,z1,z2).

Else

1) If (τ,t1,t2)T, pick randomly t1,t21 uniformly. Else extract (τ,t1,t2)T and compute

2) y1=t1,y2=t2,

3) w=ay1+y2

4) c=H(A,t,w,μ)

5) z1=y1+cs1,z2=y2+cs2

6) Run the RejectionSample (z1,z2,cs1,cs2) and go to 1) if it rejects.

7) Set T=T{τ,t1,t2}, σ¯=(c,z1,z2)j=j+1

Return σ¯

When A makes some reset queries rt, set j = 0, τ=.

First, Game 0 and Game 1 are indistinguishable by the distinguishing between PRF and some random functions, i.e.,|Pr[S1]Pr[S0]|=AdvA,FPRF(λ).

Aiming at Game 2, we modify this game as Game 1 in the following:

If j = 1 mod 2, whether (τ,t1,t2) in T or not. If is not checked, (t1,t2)1 is chosen randomly and y1=t1,y2=t2.

Secondly, we denote Col be the event that τj=τl for some lQS. Game 1 and Game 2 are both proceeding identically if the algorithm Col can not happen, i.e., |Pr[S2]Pr[S1]|Pr[Col]QS2|q|.

Due to Game 3, we modify this game as Game 2 in the following:

While A makes some reset queries rt, Game 3 is not able to reset j and τ but it answers the adversary A’s other queries by some same ways similar to Game 2.

Finally, the distribution of subverted FS-LBS scheme FS-LBS¯ is identical to the distribution of real FS-LBS scheme except of j=0 mod 2 and j=1 mod 2, because (t1,t2)1 is chosen randomly and y1=t1,y2=t2 depends on τ. That is to say, though this game can not be able to do anything on receiving these reset queries, this distribution between Game 2 and Game 3 is the same. That also means that A cannot be able to obtain any advantages in surmising b from inquiring about some signing oracles, i.e., Pr[S2]=Pr[S3]=12.

Taking all together, we haveAdvA,FS-LBS,FS-LBS¯detect(λ)AdvA,Fprf(λ)+QS2|q|.

Theorem 3   (Deterability). Given FS-LBS scheme, the FS-LBS¯ can be deterable under solving a linear equation with probability 1.

Proof   When FS-LBS scheme is not subverted, assume that an adversary B gets two FS-LBS signatures σ1=(c1,z11,z12),σ2=(c2,z21,z22) on colliding messages μ1=(a,p1),μ2=(a,p2). By the signature algorithm of FS-LBS, B has the following relations:{z11=y1+c1s1z12=y2+c1s2z21=y1+c2s1z22=y2+c2s2

There are four linear equations with four unknown information y1,y2,s1,s2 on . So these unknown information can be solved, i.e.,s1=z11z21c1c2,s2=z12z22c1c2

If FS-LBS scheme is subverted, the subverted signature can be found. Due to the solved secret keys, a signature can be verified whether the signature is an original FS-LBS signature or a subverted signature FS-LBS¯. Hence, the FS-LBS¯ can be deterable by solving a linear equation with probability 1.

4 Parameter Analysis

4.1 Numerical Analysis

This part first numerically makes some efficiency of our deterable subverted FS-LBS scheme in terms of storage overhead and computational overhead which are listed in Table 2 and Table 3.

As for the storage overhead, it consists of size of pair of public/secret keys and size of signature which is listed in Table 2. The communication cost is determined by the number of j. As for the computational overhead, compared with the Hash functions, the most resource-consuming operation is the multiplication over ring . In the signing process, Ver process and Deter process, the computational overhead is listed in Table 2, where the number of multiplications over ring is linear to the number of j. For simplicity, we denote that PM represents the polynomial point multiplications, PA represents the polynomial additions, PS represents the polynomial subtraction, RS represents polynomial Gauss sampling and H and F represent the Hash functions.

By implementation analysis in Ref. [9], we can see that there needs at most three consecutive signatures in the subverted FS-LBS which does not affect practicality of the subverted FS-LBS. So in our constructed scheme, we do not consider signature loss. Here we only analyze the security level, size of secret keys (sk), size of public keys (pk) and size of signature for some deterable subverted FS-LBS in Refs. [20, 21, 29-32]. From Tables 2-3, we can see that our deterable subverted signatures have reasonable efficiency in terms of communication cost, computational overhead and storage overhead.

Table 2

Storage and communication overhead of deterable subverted FS-LBS scheme

Table 3

Computational overhead of deterable subverted FS-LBS scheme

4.2 Implementation

The implementation is conducted with NFLlib, which is a NTT-based fast lattice cryptography library, on Intel i7-7700 CPU @ 3.60GHz and Ubuntu linux operation system. By statistics, these important algorithm operations mainly consist one polynomial addition, one polynomial multiplication and one polynomial Gaussian. Since the implementation of any Hash function is not included in NFLlib, we test the running time of three hash functions by a HMAC based on SM3 algorithm. The execution time of each cryptographic operation in different parameters is shown in Table 4. Here the execution time of these Hash functions we consider is the same.

Experimental results for proposed deterable subverted FS-LBS of each algorithm are depicted in Fig. 1. We increase the number of j from 2 to 10 for each test to see the time cost of Sign¯, Ver and Deter algorithm. Here procedure of subversion key generation can be considered as a random number, so we can omit its time consumption.

thumbnail Fig. 1 Simulation results of our construction for different j, l

On one hand, for different parameters in Table 4, the time consuming of subverted sign Sign¯ algorithm is about 0.1278×l+0.2294×(j-l) ms, 0.1275×l+0.2351 ×(j-l) ms, 0.1895×l+0.3623×(j-l) ms, 0.2084×l+ 0.3789 ×(j-l) ms, 0.4141×l+0.674 4×(j-l) ms for the number of j, l. The time efficiency of Ver algorithm is about 0.3344 ms, 0.3451 ms, 0.5373 ms, 0.5559 ms, 0.9614 ms. The time efficiency of Deter algorithm is about 0.0050 ms, 0.0046 ms, 0.0074 ms, 0.0095 ms, 0.0240 ms. On the other hand, suppose that j =10 and l = 1, 2, 3, 4, 5, according to Fig. 1, we can see that time cost of the total algorithm justifies the feasibility.

Table 4

The cryptographic operation time in the scheme ms

5 Conclusion

This paper first explores a novel algorithm substitution method on lattice-based Fiat-Shamir type signature schemes. Based on this, then we provide countermeasures to deterable signature subversion. Security proof shows that our construction satisfies three different security and privacy requirements. Parameter analysis demonstrates that our construction is feasible. In future, we will study our algorithm by widening range of possible schemes that is vulnerable to algorithm substitution attack or by other much more valuable methods and countermeasures on these post quantum secure signatures. In addition, some other possible work will focus on some algorithm substitution attacks on other cryptographic primitives.

References

  1. Easttom W. Cryptographic backdoors [C]//Modern Cryptography. Berlin: Springer-Verlag, 2021: 373-383. [Google Scholar]
  2. Peyrin T, Wang H. The Malicious framework: Embedding backdoors into tweakable block ciphers[C]// Proc Annual International Cryptology Conference. Berlin: Springer- Verlag, 2020: 249-278. [Google Scholar]
  3. Dauterman E, Corrigan-Gibbs H, Mazières D, et al. True2F:Backdoor-resistant authentication tokens [C]// 2019 IEEE Symposium on Security and Privacy (SP). Washington D C: IEEE, 2019: 398-416. [Google Scholar]
  4. Ball J, Borger J, Greenwald G. Revealed: How US and UK spy agencies defeat internet privacy and security[J]. The Guardian, 2013, ED-6: 2-8. [Google Scholar]
  5. Bernstein D J, Lange T, Niederhagen R. Dual EC: A standardized back door[J]. The New Codebreakers-Volume 9100, 2015: 256-281. DOI: https://doi.org/10.1007/978-3-662-49301- 4_17. [Google Scholar]
  6. Bellare M, Paterson K G, Rogaway P. Security of symmetric encryption against mass surveillance [C] // Advances in Cryptology, CRYPTO 2014. Berlin:Springer-Verlag, 2014: 1-19. [Google Scholar]
  7. Ateniese G, Magri B, Venturi D. Subversion-resilient signature schemes [C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, New York: ACM, 2015: 364-375. [Google Scholar]
  8. Liu C, Chen R, Wang Y, et al. Asymmetric subversion attacks on signature schemes [C]// Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2018: 376-395. [Google Scholar]
  9. Baek J, Susilo W, Kim J, et al. Subversion in practice: How to efficiently undermine signatures [C]// IEEE Access, 2019: 376-395. [Google Scholar]
  10. Catalano D, Fuchsbauer G, Soleimanian A. Double-authentication-preventing signatures in the standard model [C]// International Conference on Security and Cryptography for Networks. Berlin: Springer-Verlag, 2020: 338-358. [Google Scholar]
  11. Poettering B, Stebila D. Double-authentication-preventing signatures [C]// ESORICS. Berlin: Springer-Verlag, 2014: 1-22. [Google Scholar]
  12. Boneh D, Kim S, Nikolaenko V. Lattice-based DAPS and generalizations: Self-enforcement in signature schemes [C]// International Conference on Applied Cryptography and Network Security. Berlin: Springer-Verlag, 2017: 457-477. [Google Scholar]
  13. Poettering B, Stebila D. Short double- and n-times-authenticationpreventing signatures from ECDSA and more [C]// 2018 IEEE European Symposium on Security and Privacy (EuroS&P). Washington D C: IEEE Press, 2018: 273-287. [Google Scholar]
  14. Poettering B. Shorter double-authentication preventing signatures for small address spaces [C]//International Conference on Cryptology in Africa, AFRICACRYPT 2018. Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2018: 344-361. [Google Scholar]
  15. Derler D, Ramacher S, Slamanig D. Generic double-authentication preventing signatures and a post-quantum instantiation [C]// International Conference on Cryptology in Africa. Berlin:Springer-Verlag, 2018: 258-276. [Google Scholar]
  16. Liu J H, Yu Y, Jia J, et al. Lattice-based double-authentica- tion-preventing ring signature for security and privacy in vehicular Ad-Hoc networks [J]. Tsinghua Science and Technology, 2019, 24(5): 575-584. [Google Scholar]
  17. Lyubashevsky V. Lattice signatures without trapdoors [C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer-Verlag, 2012: 738-755. [Google Scholar]
  18. Shor P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer [J]. SIAM Review, 1999, 41(2): 303-332. [NASA ADS] [CrossRef] [MathSciNet] [Google Scholar]
  19. Ajtai M. Generating hard instances of lattice problems [C]// Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing. New York: ACM, 1996: 99-108. [Google Scholar]
  20. Ducas L, Durmus A, Lepoint T, et al. Lattice signatures and bimodal Gaussians [C]// Annual Cryptology Conference. Berlin: Springer-Verlag, 2013: 40-56. [Google Scholar]
  21. Güneysu T, Lyubashevsky V, Pöppelmann T, et al. Practical latticebased cryptography: A signature scheme for embedded systems [C]// International Workshop on Cryptographic Hardware and Embedded Systems, ACM Transactions on Embedded Computter Systems. New York: ACM, 2012: 530-547. [Google Scholar]
  22. Hoffstein J, Pipher J, Schanck J M, et al. Practical signatures from the partial Fourier recovery problem [C]//International Conference on Applied Cryptography and Network Security. Berlin: Springer-Verlag, 2014: 476-493. [Google Scholar]
  23. Akleylek S, Bindel N, Buchmann J, et al. An efficient lattice based signature scheme with provably secure instantiation [C]// International Conference on Cryptology in Africa. Berlin: Springer-Verlag, 2016: 44-60. [Google Scholar]
  24. Goldreich O, Goldwasser S, Halevi S. Public-key cryptosystems from lattice reduction problems [C]//Annual International Cryptology Conference. Berlin: Springer-Verlag, 1997: 112-131. [Google Scholar]
  25. Hoffstein J, Howgrave-Graham N, Pipher J, et al. Digital signatures using the NTRU lattice [C]//Cryptographers Track RSA Conference. Berlin: Springer-Verlag, 2003: 122-140. [Google Scholar]
  26. Espitau T, Fouque P A, Gerard B, et al. Loop-abort faults on lattice based signature schemes and key exchange protocols [J]. IEEE Transactions on Computers, 2018, 67(11): 1535-1549. [MathSciNet] [Google Scholar]
  27. Lyubashevsky V, Peikert C, Regev O. On ideal lattices and learning with errors over rings [J]. Journal of the ACM, 2013, 60(6): 1-34. [CrossRef] [Google Scholar]
  28. Bert P, Fouque P A, Roux-Langlois A, et al. Practical implementation of ring-SIS/LWE based signature and IBE [C]//International Conference on Post-Quantum Cryptography. Berlin: Springer-Verlag, 2018: 271-291. [Google Scholar]
  29. Bai S, Galbraith S D. An improved compression technique for signatures based on learning with errors [C]// CryptographersTrack at the RSA Conference. Berlin: Springer- Verlag, 2014: 28-47. [Google Scholar]
  30. Ducas L, Kiltz E, Lepoint T, et al. Crystals-dilithium: A lattice-based digital signature scheme [C]//IACR Transactions on Cryptographic Hardware and Embedded Systems, A Lattice-Based Digital Signature Scheme. New York: IACR, 2018: 238-268. [Google Scholar]
  31. Chopra A. GLYPH: A new insantiation of the GLP digital signature scheme [C]// IACR Cryptology ePrint Archive. New York: IACR, 2017: 1-14. [Google Scholar]
  32. Ducas L. Accelerating Bliss: The geometry of ternary polynomials[C]// IACR Cryptology ePrint Archive. New York: IACR, 2014: 1-12. [Google Scholar]
  33. Gentry C, Peikert C, Vaikuntanathan V. Trapdoors for hard lattices and new cryptographic constructions [C]// Proceedings of the 40th Annual ACM Symposium on Theory of Computing. New York: ACM Press, 2008: 17-20. [Google Scholar]

All Tables

Table 1

Notations

Table 2

Storage and communication overhead of deterable subverted FS-LBS scheme

Table 3

Computational overhead of deterable subverted FS-LBS scheme

Table 4

The cryptographic operation time in the scheme ms

All Figures

thumbnail Fig. 1 Simulation results of our construction for different j, l
In the text

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.