New Methods and Abstractions for RSA-Based Forward Secure Signatures

被引:3
|
作者
Hohenberger, Susan [1 ]
Waters, Brent [2 ,3 ]
机构
[1] Johns Hopkins Univ, Baltimore, MD 21218 USA
[2] Univ Texas Austin, Austin, TX USA
[3] NTT Res, Austin, TX USA
关键词
D O I
10.1007/978-3-030-57808-4_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We put forward a new abstraction for achieving forward-secure signatures that are (1) short, (2) have fast update and signing and (3) have small private key size. Prior work that achieved these parameters was pioneered by the pebbling techniques of Itkis and Reyzin (CRYPTO 2001) which showed a process for generating a sequence of roots h(1/e1), h(1/e2), ..., h(1/eT) for a group element h in Z(N)*. However, the current state of the art has limitations. First, while many works claim that Itkis-Reyzin pebbling can be applied, it is seldom shown how this non-trivial step is concretely done. Second, setting up the pebbling data structure takes T time which makes key generation using this approach expensive (i.e., T time). Third, many past works require either random oracles and/or the Strong RSA assumption; we will work in the standard model under the RSA assumption. We introduce a new abstraction that we call an RSA sequencer. Informally, the job of an RSA sequencer is to store roots of a public key U, so that at time period t, it can provide U-1/et, where the value e(t) is an RSA exponent computed from a certain function. This separation allows us to focus on building a sequencer that efficiently stores such values, in a forward-secure manner and with better setup times than other comparable solutions. In addition, our sequencer abstraction has certain re-randomization properties that allow for constructing forward-secure signature schemes with a single trusted setup that takes T time and afterward individual key generation takes lg(T) time. We demonstrate the utility of our abstraction by using it to provide concrete forward-secure signature schemes. We first give a random-oracle construction that closely matches the performance and structure of the Itkis-Reyzin scheme with the important exception that key generation can be realized much faster (after the one-time setup). We then move on to designing a standard model scheme. We believe this abstraction and illustration of how to use it will be useful for other future works. We include a detailed performance evaluation of our constructions, with an emphasis on the time and space costs for large caps on the maximum number of time periods T supported. Our philosophy is that frequently updating forward secure keys should be part of "best practices" in key maintenance. To make this practical, even for bounds as high as T = 2(32), we show that after an initial global setup, it takes only seconds to generate a key pair, and only milliseconds to update keys, sign messages and verify signatures. The space requirements for the public parameters and private keys are also a modest number of kilobytes, with signatures being a single element in Z(N) and one smaller value.
引用
收藏
页码:292 / 312
页数:21
相关论文
共 50 条
  • [21] RSA-based auto-recoverable cryptosystems
    Young, A
    Yung, M
    PUBLIC KEY CRYTOGRAPHY, 2000, 1751 : 326 - 341
  • [22] Forward Secure Identity-Based Signature Scheme with RSA
    Ko, Hankyung
    Jeong, Gweonho
    Kim, Jongho
    Kim, Jihye
    Oh, Hyunok
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 314 - 327
  • [23] Attacking RSA-based sessions in SSL/TLS
    Klíma, V
    Pokorny, O
    Rosa, T
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 426 - 440
  • [24] An RSA-based Algorithm for Secure D2D-aided Multicast Delivery of Multimedia Services
    Suraci, Chiara
    Pizzi, Sara
    Molinaro, Antonella
    Iera, Antonio
    Araniti, Giuseppe
    2020 IEEE INTERNATIONAL SYMPOSIUM ON BROADBAND MULTIMEDIA SYSTEMS AND BROADCASTING (BMSB), 2020,
  • [25] An efficient RSA-based certificateless signature scheme
    Zhang, Jianhong
    Mao, Jane
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (03) : 638 - 642
  • [26] RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery
    Nenadic, Aleksandra
    Zhang, Ning
    Shi, Qi
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (05) : 757 - 777
  • [27] Lattice-Based Forward Secure Proxy Signatures
    Xie J.
    Hu Y.
    Jiang M.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (03): : 583 - 597
  • [28] The sampling twice technique for the RSA-based cryptosystems with anonymity
    Hayashi, R
    Tanaka, K
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 216 - 233
  • [29] Comment on an Enhanced RSA-based Partially Blind Signature
    Liu, Chenglian
    Zhan, Jinsong
    Zhang, Jianhong
    FRONTIERS OF GREEN BUILDING, MATERIALS AND CIVIL ENGINEERING, PTS 1-8, 2011, 71-78 : 3207 - +
  • [30] On the traceability on RSA-based partially signature with low computation
    Wen, HA
    Lee, KC
    Hwang, SY
    Hwang, T
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (01) : 421 - 425