Open Access
Issue
Wuhan Univ. J. Nat. Sci.
Volume 27, Number 1, March 2022
Page(s) 17 - 25
DOI https://doi.org/10.1051/wujns/2022271017
Published online 16 March 2022

© Wuhan University 2022

Licence Creative CommonsThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

0 Introduction

Since the first computer was intruded, hackers have been developing the technology of “backdoor” which allows them to enter the system again. The main functions of the backdoor is that it has no ability to prevent the system manager from entering this system again and discover these hackers. Many techniques have been used in this “backdoor”, such as intercepting postal shipping to steal and substitute networking hardware, sabotaging Internet routers, injecting malware, installing backdoors, wire-tapping undersea cables and so on [1-3].

In 2013, Edward Snowden brought shocking news that many ongoing surveillance programs with an underlying “backdoor” target at citizens conducting by National Security Agency (NSA) and partners from all over the world [4]. A typical example is a pseudorandom generator (PRG) named Dual_EC_ DRBG backdoored by NSA, from NIST (National Institute of Standards and Technology). After choosing a few concrete parameters employed in the PRG, an attacker or any adversary is not able to differentiate exports on PRG from any random number but can forecast following exports[5]. In this circumstances, post-Snowden cryptography attracts much of attentions in recent years.

As one of the research topics in post-Snowden cryptography, the notion of algorithm substitution attack (ASA) was formalized by Bellare et al[6] in some semantics from algorithms named symmetric encryption algorithms. The ASA method is capable of any attacker or old big brother to substitute a few of pieces of randomized encryption algorithms or signature algorithms with a modified one such that it can leak secret keys subliminally and undetectably to the adversary. Ateniese et al[7] first proposed a model of ASA on signature schemes, however, the subverted signature is generic and inefficient. Then Liu et al[8] introduced a much high efficient ASA method about one affirmatory crowd in some signature schemes. Recently, Beak et al[9] presented a much more efficient and undetectable method ASA from a classical DSA (digital signature algorithm) digital signature. At present most proposed subverted signatures only consider how to subvert signature schemes, there still needs some countermeasures to address big brother’s threat, while a new proposed signatures named double authentication preventing signatures can be used to deter this kind of big brother’s action.

The double authentication preventing signatures (DAPS) are a class of extraordinary digital signatures with double signatures extractability which means deterable when there exist two different signatures from messages (m0, p1) and (m0, p2), where p1p2. When a signature is subverted and satisfies double signature extractability, the subverted signature can be deterable by revealing real signature’s signing secret keys to anyone. Unlike these two ring signatures with linkability and traceability[10-13], our DAPRS (double authentication preventing ring signatures) has stronger accountability which leads any two pairs of signatures produced by same member in a ring set to reveal his (or her) secret signing keys. As for linkable ring signatures, it allows anyone to efficiently decide whether any two pairs of signatures are produced by the same member without revealing his (or her) identity. As for traceable ring signatures, it can reveal his (or her) identity if any two signatures are produced by the same member. On the basis of the digital signatures in Refs. [14-16], most designed DAPS based on discrete logarithm problems and large integer factorization problems face new challenges because there exist polynomial computational complexity quantum algorithms to solve the two problems, such as Shor algorithm[17,18]. Hence, it is necessary to study some post quantum secure DAPS.

Lattice-based signature is a cutting-edge cryptographic “technology”. It has several interesting properties, such as high computational efficiency, novel and powerful cryptographic functionalities/applications, strong provable security guarantees, believed “post-quantum” security and so on. Therefore, it is vital for us to study some lattice-based algorithm substitution attacks. While most efficient lattice-based signatures which are a promising post-quantum cryptography belong to Fiat-Shamir signature paradigms (e.g., BLISS[19,20], GLP[21], PASSSign[22], Ring-TESLA[23]) and Hash-and-sign paradigms (e.g., GGH[24], NTRUSign[25], GPV[25]) at the NIST workshop on post-quantum cryptography. Lattice-based Hash-and-sign paradigm follows that a trapdoor function can be provided by a short lattice basis. Most of them are heuristic security (no actual security proofs) and are relatively inefficient than lattice-based Fiat-Shamir (FS) signature paradigms[26]. Furthermore most lattice-based Hash-and-sign paradigms have unique signatures which are against subversion attacks[7]. Hence we aim at algorithm substitution attacks on FS lattice signature paradigms (FS-LBS). In this paper, we present ASA against those schemes that any three consecutive subverted signatures can extract signing keys. At the same time, we provide some countermeasures against ASA by using DAPS to deter the big brother’s threaten. And we show that our scheme can be applied to some practical architectures based on some concrete experiment analysis.

The remainder of this paper is organized in the following sequence. Section 1 shows some preliminaries and cryptographic knowledge. Section 2 provides some notions about deterable subverted signatures and some design requirements. Section 3 presents our concrete deterable subverted FS-LBS scheme and gives proof of key extraction, undetectability and deterability. In Section 4, we make some parameter analysis and performance evaluation. Finally, we give our conclusions.

1 Preliminaries

1.1 Notations

Some basic notations have been shown in Table 1.

Table 1

Notations

1.2 Cryptographic Problems on Lattices

Definition 1   (Ring-SISq,m,β[27,28]) Given m uniformly elements RiqMathematical equation at random and let a=(a1,,am)Mathematical equation, search a vector zmMathematical equation but not zero vector with the relation zβMathematical equation satisfyingaz=0qMathematical equation

Note that in ring-SIS, each aiqMathematical equation corresponds to n related vectors aiZqnMathematical equation in SIS, where n is the degree of Mathematical equation. Each ziMathematical equation of a ring-SIS solution corresponds to a block of n integers, that means aiZqm×mMathematical equation and zZm×mMathematical equation.

Definition 2   (Ring-LWE n,q,DR,σMathematical equation[27,28]) Given m uniformly elements ai,biqMathematical equation at random and let a=(a1,,am)q,b=(b1,,bm)qMathematical equation, this algorithm is to search a vector smMathematical equation satisfying b=as+eMathematical equation, here eDm,σMathematical equation.

Definition 3   (Rejection sampling lemma [29-33])

Suppose that VZmMathematical equation. Let h:VRMathematical equation be a random distribution from a Hash value, and σ=ω(logm)Mathematical equation. If a constant M exists, the following distribution

1) vhMathematical equation

2) zDσmMathematical equation

3) Output (z,v)Mathematical equation with probability of 1mMathematical equation and the below distribution

1) vhMathematical equation

2) zDv,σmMathematical equation

3) Output (z,v)Mathematical equation with probability of min(Dσm(z)MDv,σm(z),1)Mathematical equation is statistically indistinguishable within distance of 2-ω(logm)MMathematical equation. In the following, we use the RejectionSample to represent the algorithm.

1.3 Description of Lattice Based Fiat-Shamir Type Signature Schemes

The Fiat-Shamir type signatures based on lattice consist of algorithms in the following:

Key Generation:

1) Pick aMathematical equation at random.

2) Choose uniformly random s11,s21Mathematical equation

3) Compute t=as1+s2Mathematical equation

4) Output a pair of public key and secret key: (a,t);(s1,s2)Mathematical equation

Sign (μ,a,s1,s2,t)Mathematical equation:

Select two random numbersy11,y21Mathematical equation

2) Calculate w=ay1+y2Mathematical equation

3) Compute a value c=H(a,t,w,μ)Mathematical equation

4) Obtain z1=y1+cs1,z2=y2+cs2Mathematical equation

5) Run the RejectionSample (z1,z2,cs1,cs2)Mathematical equation and go to 1) if it rejects.

6) Output a pair of signature (c,z1,z2)Mathematical equation

Verify (μ,a,z1,z2,t)Mathematical equation:

1) Check w=az1+z2ctMathematical equation mod q whether holds or not.

2) Accept if and only if the equation c=H(a,t,w,μ)Mathematical equation and a small norm (z1,z2)Mathematical equation holds.

Here 1Mathematical equation with tiny modulus is the subset of Mathematical equation. Cryptographic Hash function H outputs a low norm subset of Mathematical equation.

1.4 Double Authentication Preventing Signatures

A DAPS includes four probability polynomial time (PPT) algorithms (KGen, Sign,Ver, Extract) as follows:

1) Given a security parameter λMathematical equation, the algorithm KGen(1λ) outputs public keys pk and private keys sk.

2) The algorithm Sign(sk, a, p) outputs a signature πMathematical equation on a pair of public/private key (pk, sk) and a subject/message pair (a, p).

3) The algorithm Ver(pk, a, p, πMathematical equation) outputs either 0 for rejection or 1 for acceptance on pk, (a, p) and πMathematical equation.

4) The algorithm Extract outputs the private key sk on input pk, (a1,p1),(a2,p2)Mathematical equation and σ1,σ2Mathematical equation, where a1=a2,p1p2Mathematical equation.

A DAPS satisfies two properties of existential unforgeability under chosen message attack (EUF-CMA) and double signature deterability (DSE)[13].

2 Our Deterable Subverted Signatures

We first provide the threat model in this section. Then we give formal definitions for the syntax of deterable subverted signatures. Compared with regular deterable digital signatures, these schemes need a “extraction key” for their manipulates if there exists a subversion attack. Finally we provide some security and functionality features of a deterable subverted signatures on the basis Refs. [7-9].

2.1 Threat Model

Since authentication services of various system models and applications depend upon digital signatures, in the context coerced users who use a DAPS to design some court convincing signatures to refuse big brothers’ (or attackers’) requirements, we construct a subverted signature with a deterable function by using an algorithm substitution attack on double authentication preventing signatures.

2.2 Notions of Deterable Subverted Signatures

Definition 4   A deterable subverted signature SIG¯Mathematical equation for nonsubverted signature SIG includes four PPT algorithms as follows:

1) On inputting a security parameter lMathematical equation, this algorithm Gen¯Mathematical equation outputs a subversion key subk.

2) On inputting a subversion key subk, a state l, a private key sk, and a message μMathematical equation, the algorithm SIG¯Mathematical equation outputs a subverted signature σMathematical equation by an updated status l.

3) On inputting a message μMathematical equation, a public key pk and a subverted signature σMathematical equation, this algorithm Ver outputs 1 which means accept and outputs 0 which means reject.

4) On inputting a pair of colliding messages (μ1,μ2)Mathematical equation, a public key pk, and its corresponding non-subverted signatures σ1,σ2Mathematical equation, this algorithm Deter outputs the private key sk.

2.3 Security and Functionality Features

The key extraction algorithm means that anyone including big brothers and attackers can compute the signature private key from known information if he or she makes a signature on a pair of colliding messages.

Definition 5   Assume that SIG=(Gen, Sign, Ver)Mathematical equation is generic signature scheme and SIG¯=(Gen¯, SIG¯,Mathematical equationVer, Deter)Mathematical equation is a deterable subverted signatures for SIG. Consider a key extraction game Keyextractionβ,SIG,SIG¯(l)Mathematical equation as follows:

1) Using Gen(1l)Mathematical equation, it can generate a pair of (pk, sk).

2) By the algorithm Gen¯(1l)Mathematical equation, it can generate a subversion key subk.

3) For i=1,2,,QSMathematical equation,

Compute (σ¯i,li)SIG¯(subk,sk,μi,li1)Mathematical equation

if an adversary ℬ queries every message μiMathematical equation

Return (σ¯i,li)Mathematical equation to ℬ.

4) ℬ outputs skMathematical equation by (pk,subk,{σ1,,σl})Mathematical equation

5) Check the equation sk=skMathematical equation whether holds or not. If it holds, return 1. Otherwise, it returns 0.

Define an advantageAdvB,SIG,SIG¯keyextract(l)=Pr[KeyextractionΒ,SIG,SIG¯(l)=1].Mathematical equation

Given the private key sk and its corresponding public key pair pk, the functionality undetectability means that any users can not find the detecting subversion.

Definition 6   Assume that a general signature SIG=(Gen, Sign, Ver)Mathematical equation and a deterable signatureSIG¯=(Gen¯, SIG¯, Ver, Deter)Mathematical equationfor SIG. Consider an undetectability game

DetectA,SIG,SIG¯(l)Mathematical equation as follows:

1) Generate a pair of public/private key (pk,sk)Mathematical equation by the algorithm Gen(1l)Mathematical equation.

2) By the algorithm Gen(1l)Mathematical equation, it can generate a subversion key subk.

3) Choose b{0,1}Mathematical equation randomly, the game ASignOb(·),Reset(·)(sk, pk)Mathematical equation outputs its guess bMathematical equation.

4) If bbMathematical equation, it returns 0, otherwise it returns 1.

SignOb(μi)Mathematical equation is given as follows:

5) If b = 0, compute σiSign(sk,μi)Mathematical equation

6) If b = 1, compute(σi,li)Sign¯(subk,sk,μi,li1)Mathematical equation

7) Return σiMathematical equation

Reset(∙) is given as follows: Reset(rti) ∥ rti is a reset query.

Define advantageAdvA,SIG,SIG¯detect(l)=|Pr[DetectA,SIG,SIG¯(l)=1]12|Mathematical equation

For any PPT adversary AMathematical equation, if there exists a negligible function ε(l)Mathematical equation satisfyingAdvA,SIG,SIG¯detect(l)=|Pr[DetectA,SIG,SIG¯(l)=1]12|ε(l)Mathematical equationthe deterable subverted signature is undetectable. It means that the Ver algorithm can output some same results when it is a subverted signature or a normal signature on some same messages.

Deterability means that it can be deterred if there exists algorithm substitution attack on signature scheme.

Definition 7   Given a general signature SIG=Mathematical equation(Gen,Sign,Ver)Mathematical equation and a deterrable signature

SIG¯=(Gen¯, SIG¯, Ver, Deter)Mathematical equation for SIG, the detera- bility game DeterC,SIG,SIG¯(l)Mathematical equation is given as follows:

1) According to the algorithm Gen(1l)Mathematical equation, it generates a pair of public/private (pk, sk).

2) Run CMathematical equation(pk, sk), then generate (μ1,μ2,σ1,σ2)Mathematical equation.

3) Return 0 if μ1Mathematical equation and μ2Mathematical equation are not colliding.

4) viVer(pk,μi,σi)Mathematical equation for i = 1, 2.

5) Return 0 if v1=0Mathematical equation or v2=0Mathematical equation.

6) Run Deter(pk,μ1,μ2,σ1,σ2)Mathematical equation, then generate sk’.

7) Return 0 if skskMathematical equation. Else return 1.

We define the advantageAdvC,SIG,SIG¯Deter(l)=Pr[DeterC,SIG,SIG¯(l)=1]Mathematical equation

The advantage means that for any PPT adversary CMathematical equation, if there exists a negligible function ε(∙) satisfyingPr[DeterC,SIG,SIG¯(l)=1]12Mathematical equationthe deterable subverted signature is deterable. It means that our scheme can deter some signatures embedding backdoors.

3 Our Deterable Subverted Lattice Based Fiat-Shamir Type Signatures

This section introduces a self-enhancement or subverted attack on Fiat-Shamir type lattice signatures.

Our subverted Fiat-Shamir type lattice-based signatures (FS-LBS) are described as follows:

● Subverted key generation SIG¯FS-LBSMathematical equation: On inputting a security parameter lMathematical equation, a pseudo random Hash function F:{0,1}l×1Mathematical equation and a random number κ1,κ2Mathematical equation{0,1}lMathematical equation, the algorithm Gen¯FS-LBSMathematical equation outputs κ1,κ2Mathematical equation and F which can be described as subk = (descF, κ1,κ2Mathematical equation).

● Subverted sign Sign¯FS-LBSMathematical equation: On inputting public keys (a,t)Mathematical equation of FS-LBS, message μMathematical equation, private keys (s1,s2)Mathematical equation, subversion key subk and a state l=(j,τ)Mathematical equation, the algorithm outputs (σ¯,l)Mathematical equation as follows.

j ← 0, τ← 0

If j=0Mathematical equation mod 2,

1) Select two random numbersy11,y21Mathematical equation

2) Calculate w=ay1+y2Mathematical equation

3) Compute a value c=H(A,t,w,μ)Mathematical equation

4) Obtain z1=y1+cs1,z2=y2+cs2Mathematical equation

5) Run the RejectionSample (z1,z2,cs1,cs2)Mathematical equation and go to 1) if it rejects.

6) Let τ=cMathematical equation and σ¯=(c,z1,z2)Mathematical equation

Else

7) Calculate w=ay1+y2Mathematical equation

8) Compute a value c=H(A,t,w,μ)Mathematical equation

9) Obtain z1=y1+cs1,z2=y2+cs2Mathematical equation

10) Run RejectionSample (z1,z2,cs1,cs2)Mathematical equation and go to 1) if it rejects.

11) Set τ=cMathematical equation and σ¯=(c,z1,z2)Mathematical equation

j = j + 1

Let l=(j,τ)Mathematical equation

Return ((σ¯,l)Mathematical equation

Verify (μ,σ¯,a,t)Mathematical equation:

1) Check w=az1+z2ctMathematical equation mod qMathematical equation whether holds or not.

2) Accept if and only if the equation c=H(a,t,w,μ)Mathematical equation and a small norm (z1,z2)Mathematical equation hold.

If a FS-LBS scheme is subverted, the action of the signer can be found by revealing real signer’s signing secret keys to anyone. When the signing keys is vital for him, in some cases the signer will be punished or the signer will result in great economic losses, or there exist some court convincing reasons to deny big-brother or authority agency demands. Aiming at the subverted lattice-based Fiat-Shamir type signatures, we add a Deter algorithm. Our Deter algorithm makes sure that the lattice-based Fiat-Shamir type signature is against algorithm substitution attack.

● Deter

By the principle of DAPS, if there exists two FS-LBS signaturesσ1=(c1,z11,z12),σ2=(c2,z21,z22)Mathematical equation

On colliding messages μ1Mathematical equation and μ2Mathematical equation, respectively, anyone can obtain the signing secret key s1=z11z21c1c2Mathematical equation and s2=z12z22c1c2Mathematical equation by solving a linear equation respectively.

Then we present our scheme satisfying Key extraction, Undetectability and Deterability.

Key extraction. From the subverted FS-LBS FS-LBS¯Mathematical equation, we show that the signing private keys of the FS-LBS can be extracted from the FS-LBS¯Mathematical equation. That is to say, any consecutive FS-LBS¯Mathematical equation starting with odd or even index is able to release the signing private keys. Below we give the formal proof.

Theorem 1   Given subverted FS-LBS scheme FS-LBS¯Mathematical equation which outputs any three consecutive signatures, the signing private keys of FS-LBS can be revealed with probability 1.

Proof   Given three messages m,m,mMathematical equation, an adversary ℬ obtains three consecutive subverted FS-LBS σ¯j=(c,z1,z2)Mathematical equation, σ¯j+1=(c,z1,z2)Mathematical equation and σ¯j+2=Mathematical equation(c,z1,z2)Mathematical equation, respectively.

If j=0Mathematical equation mod 2, by using ℬ’s subversion keys subk (κ1,κ2,F)Mathematical equation, compute signing keys as follows:y1=F(κ1,c),y2=F(κ2,c),Mathematical equation

Calculate w=ay1+y2Mathematical equation

Compute a value c=H(A,t,w,μ)Mathematical equation

s1=c1(z1y1)Mathematical equation and s2=c1(z2y2)Mathematical equation

Return s1,s2Mathematical equation.

If j = 1 mod 2, j + 1 = 0 mod 2. ℬ chooses σ¯j+1=(c,z1,z2)Mathematical equation and σ¯j+2=(c,z1,z2)Mathematical equation to compute the signing keys s1,s2Mathematical equation by using the same method as above, so ℬ can compute the signing keys by the subverted signature algorithm Sign¯FS-LBSMathematical equation. Hence,AdvB,FS-LBS¯extract(λ)=1.Mathematical equation

Undetectability. We show that our constructed subverted FS-LBS scheme FS-LBS¯Mathematical equation is undetectable by Theorem 2.

Theorem 2   Given subverted FS-LBS scheme FS-LBS¯Mathematical equation, the detection advantage is negligible under the assumption of pseudo-random function (PRF) F.

Proof   By a sequence of games, we prove the theorem. We define the events Si(i=1,2,)Mathematical equation of games GiMathematical equation that is b=bMathematical equation.

Game 0. The original undetectability game DetectDetectA,FS-LBS,FS-LBS¯(λ).Mathematical equation

Game 1   As before, but we modify Game 0 to use b = 0 for answering AMathematical equation’s queries as Game 0 and to use a uniform random string for substituting b = 1 (j = 1 mod 2) and noncomputed y1,y2Mathematical equation by PRF. A detailed description is given as follows.T.Mathematical equation

If b=0, this game responds to a valid FS-LBS scheme and j = 0, τ=Mathematical equation to AMathematical equation after receiving every signing query on m and a reset query rt , respectively.

If b = 1, this game carries on as follows:

When AMathematical equation does some signing queries on m,

j ←0, τ←0

If j = 0 mod 2

1) Pick y11,y21Mathematical equation

2) Compute w=ay1+y2Mathematical equation and

3) Compute c=H(A,t,w,μ)Mathematical equation and

4) Calculate z1=y1+cs1,z2=y2+cs2Mathematical equation and

5) Run the RejectionSample (z1,z2,cs1,cs2)Mathematical equation, and return 0 if it accepts.

6) Set τ=cMathematical equation and σ¯=(c,z1,z2)Mathematical equation.

Else

1) If (τ,t1,t2)TMathematical equation, pick randomly t1,t21Mathematical equation uniformly. Else extract (τ,t1,t2)TMathematical equation and compute

2) y1=t1,y2=t2Mathematical equation,

3) w=ay1+y2Mathematical equation

4) c=H(A,t,w,μ)Mathematical equation

5) z1=y1+cs1,z2=y2+cs2Mathematical equation

6) Run the RejectionSample (z1,z2,cs1,cs2)Mathematical equation and go to 1) if it rejects.

7) Set T=T{τ,t1,t2}Mathematical equation, σ¯=(c,z1,z2)Mathematical equationj=j+1Mathematical equation

Return σ¯Mathematical equation

When AMathematical equation makes some reset queries rt, set j = 0, τ=Mathematical equation.

First, Game 0 and Game 1 are indistinguishable by the distinguishing between PRF and some random functions, i.e.,|Pr[S1]Pr[S0]|=AdvA,FPRF(λ).Mathematical equation

Aiming at Game 2, we modify this game as Game 1 in the following:

If j = 1 mod 2, whether (τ,t1,t2)Mathematical equation in TMathematical equation or not. If is not checked, (t1,t2)1Mathematical equation is chosen randomly and y1=t1,y2=t2Mathematical equation.

Secondly, we denote Col be the event that τj=τlMathematical equation for some lQSMathematical equation. Game 1 and Game 2 are both proceeding identically if the algorithm Col can not happen, i.e., |Pr[S2]Pr[S1]|Pr[Col]QS2|q|Mathematical equation.

Due to Game 3, we modify this game as Game 2 in the following:

While AMathematical equation makes some reset queries rt, Game 3 is not able to reset j and τ but it answers the adversary AMathematical equation’s other queries by some same ways similar to Game 2.

Finally, the distribution of subverted FS-LBS scheme FS-LBS¯Mathematical equation is identical to the distribution of real FS-LBS scheme except of j=0 mod 2 and j=1 mod 2, because (t1,t2)1Mathematical equation is chosen randomly and y1=t1,y2=t2Mathematical equation depends on τMathematical equation. That is to say, though this game can not be able to do anything on receiving these reset queries, this distribution between Game 2 and Game 3 is the same. That also means that AMathematical equation cannot be able to obtain any advantages in surmising bMathematical equation from inquiring about some signing oracles, i.e., Pr[S2]=Mathematical equationPr[S3]=12Mathematical equation.

Taking all together, we haveAdvA,FS-LBS,FS-LBS¯detect(λ)AdvA,Fprf(λ)+QS2|q|.Mathematical equation

Theorem 3   (Deterability). Given FS-LBS scheme, the FS-LBS¯Mathematical equation can be deterable under solving a linear equation with probability 1.

Proof   When FS-LBS scheme is not subverted, assume that an adversary BMathematical equation gets two FS-LBS signatures σ1=(c1,z11,z12),σ2=(c2,z21,z22)Mathematical equation on colliding messages μ1=(a,p1),μ2=(a,p2)Mathematical equation. By the signature algorithm of FS-LBS, BMathematical equation has the following relations:{z11=y1+c1s1z12=y2+c1s2z21=y1+c2s1z22=y2+c2s2Mathematical equation

There are four linear equations with four unknown information y1,y2,s1,s2Mathematical equation on Mathematical equation. So these unknown information can be solved, i.e.,s1=z11z21c1c2,s2=z12z22c1c2Mathematical equation

If FS-LBS scheme is subverted, the subverted signature can be found. Due to the solved secret keys, a signature can be verified whether the signature is an original FS-LBS signature or a subverted signature FS-LBS¯Mathematical equation. Hence, the FS-LBS¯Mathematical equation can be deterable by solving a linear equation with probability 1.

4 Parameter Analysis

4.1 Numerical Analysis

This part first numerically makes some efficiency of our deterable subverted FS-LBS scheme in terms of storage overhead and computational overhead which are listed in Table 2 and Table 3.

As for the storage overhead, it consists of size of pair of public/secret keys and size of signature which is listed in Table 2. The communication cost is determined by the number of j. As for the computational overhead, compared with the Hash functions, the most resource-consuming operation is the multiplication over ring Mathematical equation. In the signing process, Ver process and Deter process, the computational overhead is listed in Table 2, where the number of multiplications over ring Mathematical equation is linear to the number of j. For simplicity, we denote that PM represents the polynomial point multiplications, PA represents the polynomial additions, PS represents the polynomial subtraction, RS represents polynomial Gauss sampling and H and F represent the Hash functions.

By implementation analysis in Ref. [9], we can see that there needs at most three consecutive signatures in the subverted FS-LBS which does not affect practicality of the subverted FS-LBS. So in our constructed scheme, we do not consider signature loss. Here we only analyze the security level, size of secret keys (sk), size of public keys (pk) and size of signature for some deterable subverted FS-LBS in Refs. [20, 21, 29-32]. From Tables 2-3, we can see that our deterable subverted signatures have reasonable efficiency in terms of communication cost, computational overhead and storage overhead.

Table 2

Storage and communication overhead of deterable subverted FS-LBS scheme

Table 3

Computational overhead of deterable subverted FS-LBS scheme

4.2 Implementation

The implementation is conducted with NFLlib, which is a NTT-based fast lattice cryptography library, on Intel i7-7700 CPU @ 3.60GHz and Ubuntu linux operation system. By statistics, these important algorithm operations mainly consist one polynomial addition, one polynomial multiplication and one polynomial Gaussian. Since the implementation of any Hash function is not included in NFLlib, we test the running time of three hash functions by a HMAC based on SM3 algorithm. The execution time of each cryptographic operation in different parameters is shown in Table 4. Here the execution time of these Hash functions we consider is the same.

Experimental results for proposed deterable subverted FS-LBS of each algorithm are depicted in Fig. 1. We increase the number of j from 2 to 10 for each test to see the time cost of Sign¯Mathematical equation, Ver and Deter algorithm. Here procedure of subversion key generation can be considered as a random number, so we can omit its time consumption.

Thumbnail: Fig. 1 Refer to the following caption and surrounding text. Fig. 1 Simulation results of our construction for different j, l

On one hand, for different parameters in Table 4, the time consuming of subverted sign Sign¯Mathematical equation algorithm is about 0.1278×l+0.2294×(j-l) ms, 0.1275×l+0.2351 ×(j-l) ms, 0.1895×l+0.3623×(j-l) ms, 0.2084×l+ 0.3789 ×(j-l) ms, 0.4141×l+0.674 4×(j-l) ms for the number of j, l. The time efficiency of Ver algorithm is about 0.3344 ms, 0.3451 ms, 0.5373 ms, 0.5559 ms, 0.9614 ms. The time efficiency of Deter algorithm is about 0.0050 ms, 0.0046 ms, 0.0074 ms, 0.0095 ms, 0.0240 ms. On the other hand, suppose that j =10 and l = 1, 2, 3, 4, 5, according to Fig. 1, we can see that time cost of the total algorithm justifies the feasibility.

Table 4

The cryptographic operation time in the scheme ms

5 Conclusion

This paper first explores a novel algorithm substitution method on lattice-based Fiat-Shamir type signature schemes. Based on this, then we provide countermeasures to deterable signature subversion. Security proof shows that our construction satisfies three different security and privacy requirements. Parameter analysis demonstrates that our construction is feasible. In future, we will study our algorithm by widening range of possible schemes that is vulnerable to algorithm substitution attack or by other much more valuable methods and countermeasures on these post quantum secure signatures. In addition, some other possible work will focus on some algorithm substitution attacks on other cryptographic primitives.

References

  1. Easttom W. Cryptographic backdoors [C]//Modern Cryptography. Berlin: Springer-Verlag, 2021: 373-383. [Google Scholar]
  2. Peyrin T, Wang H. The Malicious framework: Embedding backdoors into tweakable block ciphers[C]// Proc Annual International Cryptology Conference. Berlin: Springer- Verlag, 2020: 249-278. [Google Scholar]
  3. Dauterman E, Corrigan-Gibbs H, Mazières D, et al. True2F:Backdoor-resistant authentication tokens [C]// 2019 IEEE Symposium on Security and Privacy (SP). Washington D C: IEEE, 2019: 398-416. [Google Scholar]
  4. Ball J, Borger J, Greenwald G. Revealed: How US and UK spy agencies defeat internet privacy and security[J]. The Guardian, 2013, ED-6: 2-8. [Google Scholar]
  5. Bernstein D J, Lange T, Niederhagen R. Dual EC: A standardized back door[J]. The New Codebreakers-Volume 9100, 2015: 256-281. DOI: https://doi.org/10.1007/978-3-662-49301- 4_17. [Google Scholar]
  6. Bellare M, Paterson K G, Rogaway P. Security of symmetric encryption against mass surveillance [C] // Advances in Cryptology, CRYPTO 2014. Berlin:Springer-Verlag, 2014: 1-19. [Google Scholar]
  7. Ateniese G, Magri B, Venturi D. Subversion-resilient signature schemes [C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, New York: ACM, 2015: 364-375. [Google Scholar]
  8. Liu C, Chen R, Wang Y, et al. Asymmetric subversion attacks on signature schemes [C]// Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2018: 376-395. [Google Scholar]
  9. Baek J, Susilo W, Kim J, et al. Subversion in practice: How to efficiently undermine signatures [C]// IEEE Access, 2019: 376-395. [Google Scholar]
  10. Catalano D, Fuchsbauer G, Soleimanian A. Double-authentication-preventing signatures in the standard model [C]// International Conference on Security and Cryptography for Networks. Berlin: Springer-Verlag, 2020: 338-358. [Google Scholar]
  11. Poettering B, Stebila D. Double-authentication-preventing signatures [C]// ESORICS. Berlin: Springer-Verlag, 2014: 1-22. [Google Scholar]
  12. Boneh D, Kim S, Nikolaenko V. Lattice-based DAPS and generalizations: Self-enforcement in signature schemes [C]// International Conference on Applied Cryptography and Network Security. Berlin: Springer-Verlag, 2017: 457-477. [Google Scholar]
  13. Poettering B, Stebila D. Short double- and n-times-authenticationpreventing signatures from ECDSA and more [C]// 2018 IEEE European Symposium on Security and Privacy (EuroS&P). Washington D C: IEEE Press, 2018: 273-287. [Google Scholar]
  14. Poettering B. Shorter double-authentication preventing signatures for small address spaces [C]//International Conference on Cryptology in Africa, AFRICACRYPT 2018. Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2018: 344-361. [Google Scholar]
  15. Derler D, Ramacher S, Slamanig D. Generic double-authentication preventing signatures and a post-quantum instantiation [C]// International Conference on Cryptology in Africa. Berlin:Springer-Verlag, 2018: 258-276. [Google Scholar]
  16. Liu J H, Yu Y, Jia J, et al. Lattice-based double-authentica- tion-preventing ring signature for security and privacy in vehicular Ad-Hoc networks [J]. Tsinghua Science and Technology, 2019, 24(5): 575-584. [Google Scholar]
  17. Lyubashevsky V. Lattice signatures without trapdoors [C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer-Verlag, 2012: 738-755. [Google Scholar]
  18. Shor P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer [J]. SIAM Review, 1999, 41(2): 303-332. [NASA ADS] [CrossRef] [MathSciNet] [Google Scholar]
  19. Ajtai M. Generating hard instances of lattice problems [C]// Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing. New York: ACM, 1996: 99-108. [Google Scholar]
  20. Ducas L, Durmus A, Lepoint T, et al. Lattice signatures and bimodal Gaussians [C]// Annual Cryptology Conference. Berlin: Springer-Verlag, 2013: 40-56. [Google Scholar]
  21. Güneysu T, Lyubashevsky V, Pöppelmann T, et al. Practical latticebased cryptography: A signature scheme for embedded systems [C]// International Workshop on Cryptographic Hardware and Embedded Systems, ACM Transactions on Embedded Computter Systems. New York: ACM, 2012: 530-547. [Google Scholar]
  22. Hoffstein J, Pipher J, Schanck J M, et al. Practical signatures from the partial Fourier recovery problem [C]//International Conference on Applied Cryptography and Network Security. Berlin: Springer-Verlag, 2014: 476-493. [Google Scholar]
  23. Akleylek S, Bindel N, Buchmann J, et al. An efficient lattice based signature scheme with provably secure instantiation [C]// International Conference on Cryptology in Africa. Berlin: Springer-Verlag, 2016: 44-60. [Google Scholar]
  24. Goldreich O, Goldwasser S, Halevi S. Public-key cryptosystems from lattice reduction problems [C]//Annual International Cryptology Conference. Berlin: Springer-Verlag, 1997: 112-131. [Google Scholar]
  25. Hoffstein J, Howgrave-Graham N, Pipher J, et al. Digital signatures using the NTRU lattice [C]//Cryptographers Track RSA Conference. Berlin: Springer-Verlag, 2003: 122-140. [Google Scholar]
  26. Espitau T, Fouque P A, Gerard B, et al. Loop-abort faults on lattice based signature schemes and key exchange protocols [J]. IEEE Transactions on Computers, 2018, 67(11): 1535-1549. [MathSciNet] [Google Scholar]
  27. Lyubashevsky V, Peikert C, Regev O. On ideal lattices and learning with errors over rings [J]. Journal of the ACM, 2013, 60(6): 1-34. [CrossRef] [Google Scholar]
  28. Bert P, Fouque P A, Roux-Langlois A, et al. Practical implementation of ring-SIS/LWE based signature and IBE [C]//International Conference on Post-Quantum Cryptography. Berlin: Springer-Verlag, 2018: 271-291. [Google Scholar]
  29. Bai S, Galbraith S D. An improved compression technique for signatures based on learning with errors [C]// CryptographersTrack at the RSA Conference. Berlin: Springer- Verlag, 2014: 28-47. [Google Scholar]
  30. Ducas L, Kiltz E, Lepoint T, et al. Crystals-dilithium: A lattice-based digital signature scheme [C]//IACR Transactions on Cryptographic Hardware and Embedded Systems, A Lattice-Based Digital Signature Scheme. New York: IACR, 2018: 238-268. [Google Scholar]
  31. Chopra A. GLYPH: A new insantiation of the GLP digital signature scheme [C]// IACR Cryptology ePrint Archive. New York: IACR, 2017: 1-14. [Google Scholar]
  32. Ducas L. Accelerating Bliss: The geometry of ternary polynomials[C]// IACR Cryptology ePrint Archive. New York: IACR, 2014: 1-12. [Google Scholar]
  33. Gentry C, Peikert C, Vaikuntanathan V. Trapdoors for hard lattices and new cryptographic constructions [C]// Proceedings of the 40th Annual ACM Symposium on Theory of Computing. New York: ACM Press, 2008: 17-20. [Google Scholar]

All Tables

Table 1

Notations

Table 2

Storage and communication overhead of deterable subverted FS-LBS scheme

Table 3

Computational overhead of deterable subverted FS-LBS scheme

Table 4

The cryptographic operation time in the scheme ms

All Figures

Thumbnail: Fig. 1 Refer to the following caption and surrounding text. Fig. 1 Simulation results of our construction for different j, l
In the text

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.