Skip to main content
Springer Nature - PMC COVID-19 Collection logoLink to Springer Nature - PMC COVID-19 Collection
. 2020 Jun 6;12174:239–257. doi: 10.1007/978-3-030-51938-4_12

Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security

Mahmoud Yehia , Riham AlTawy ‡,, T Aaron Gulliver
Editors: Abderrahmane Nitaj8, Amr Youssef9
PMCID: PMC7334985

Abstract

FORS is the underlying hash-based few-time signing scheme in SPHINCSInline graphic, one of the nine signature schemes which advanced to round 2 of the NIST Post-Quantum Cryptography standardization competition. In this paper, we analyze the security of FORS with respect to adaptive chosen message attacks. We show that in such a setting, the security of FORS decreases significantly with each signed message when compared to its security against non-adaptive chosen message attacks. We propose a chaining mechanism that with slightly more computation, dynamically binds the Obtain Random Subset (ORS) generation with signing, hence, eliminating the offline advantage of adaptive chosen message adversaries. We apply our chaining mechanism to FORS and present DFORS whose security against adaptive chosen message attacks is equal to the non-adaptive security of FORS. In a nutshell, using SPHINCSInline graphic-128s parameters, FORS provides 75-bit security and DFORS achieves 150-bit security with respect to adaptive chosen message attacks after signing one message. We note that our analysis does not affect the claimed security of SPHINCSInline graphic. Nevertheless, this work provides a better understanding of FORS and other HORS variants, and furnishes a solution if new adaptive cryptanalytic techniques on SPHINCSInline graphic emerge.

Keywords: Digital signatures, Hash-based signature schemes, Post-Quantum Cryptography, Adaptive chosen message attacks

Introduction

The current digital signature infrastructure adopts schemes that rely on the hardness of factoring or finding discrete logarithms in finite groups [12, 18, 24]. Given recent advances in physics which point towards the eventual construction of large scale quantum computers [1], these hard problems will be solved in polynomial time using Shor’s algorithm [25]. Lattice-based, coding-based, and multivariate signatures are considered quantum resilient schemes in the Q1 model [7]. However, either their exact security with respect to quantum attacks is still not clear [5, 11] or their communication/storage complexity is impractical to a multitude of applications, e.g., megabyte keys for the matrices of McEliece-based cryptosystems [27]. On the other hand, hash-based digital signatures have moderately sized keys (order of kilobytes), and their quantum security relies solely on that of hash functions based on Grover’s algorithm. They have been proven to offer simple quantum resilient security properties [26]. Note that the proofs in [26] follow the Q1 model where no superposition queries to quantum oracles are allowed [7].

Hash-based signature algorithms are comprised of two schemes, an underlying signing scheme and an extension algorithm. The former algorithm defines the main signing procedure where a key pair can be used to sign one (Lamport [19], Winternitz one time signature scheme (WOTS), WOTS++ [8, 14]) or a few messages (e.g., Biba [21], HORS [23], HORS++ [22], PORS [2], and FORS [4]), after which a new key pair should be generated to maintain security against forgery attacks. More precisely, the security of hash-based few time (HBFT) signature schemes decreases after revealing each signature, and hence their bit-security is given under the condition that re-keying is required after r signatures. Accordingly, translating this constraint to acceptable attack models implies that a maximum of r queries are allowed to the signing oracle.

The extension algorithm is a top level construction that employs several instances of underlying signing schemes (OTS and HBFT) in a Merkle tree structure. Such an algorithm enables signing multiple messages where signatures are verified with one public key (Merkle root). Extension algorithms can be stateful such as Merkle Signature Scheme MSS [20], eXtended Merkle Signature Scheme (XMSS) [9], XMSS+ [15], Multi Tree XMSS (XMSSInline graphic) [16], and XMSS with tightened security (XMSS-T) [17], or stateless such as SPHINCS [5], SPHINCSInline graphic [4, 6], and Gravity SPHINCS [3]. Stateless signature algorithms conform to the basic definition of digital signatures where no state updates are required to guarantee security, and only keys are needed to securely generate valid signatures at any time.

The security of hash-based signature algorithms relies on the security of the underlying basic signing schemes. SPHINCS is a hyper-tree construction that uses WOTS and HORS trees for signing. In [2], Aumasson and Endignoux investigated the subset-resilience problem [23] and showed that HORS is vulnerable to weak-message attacks where an adaptive adversary looks for messages that produce smaller Obtain Random Subsets (ORSs). Consequently, they reported a 7-bit decrease in the expected security of SPHINCS against classical attacks. Moreover, they proposed PORS, a variant of HORS which employs a pseudorandom bit generator (PRNG) instead of a hash function to obtain random subsets with distinct elements, thus avoiding the effect of weak messages. However, PORS is not secure against adaptive chosen message attacks where an adversary is able to generate random subsets for as many messages as they want, and select a set of r message for online queries. Finally, FORS, another HORS variant, was proposed and is currently adopted in SPHINCSInline graphic, a round 2 candidate in the NIST Post-Quantum Cryptography standardization competition [4, 10]. Compared to PORS, FORS mitigates weak-message attacks by increasing the size of the keys by a factor of Inline graphic where Inline graphic is the number of random subsets, and the overall signature size is also increased when it is integrated in a hyper-tree structure. On its own, the security of FORS against adaptive chosen message attacks decreases significantly with each signed message, which currently has no known effect on the security of SPHINCSInline graphic because it employs a pseudorandomly generated randomizer that is publicly sent along with the signature, and is used as a key for the hash function in FORS to obtain the random subsets. However, if cryptanalytic techniques are devised which can annihilate how this public randomizer is utilized or can break its generation procedure, then SPHINCSInline graphic will be vulnerable to adaptive chosen message attacks. Hence, given the significance of SPHINCSInline graphic as a candidate for standardization, we believe our analysis of its underlying signature scheme, FORS, is important, along with DFORS which offers a drop-in strengthened candidate.

Our Contribution. In what follows, we summarize the contributions of this paper.

  • We analyze the security of FORS against adaptive chosen message adversaries. We show that its bit security with respect to adaptive chosen message attacks decreases significantly when compared to its security in a non-adaptive setting. We adopt the adaptive chosen message attack model defined by Reyzin and Reyzin [23] and used in the analysis of HORS and PORS.

  • We propose a hash chaining mechanism that binds the process of generating a message ORS with signing it, which eliminates the offline adversarial advantage and makes ORS generation feasible only for the signing entity. We apply the chaining scheme to FORS and present Dynamic Forest Of Random Subsets (DFORS), a new HORS variant that resists adaptive chosen message attacks. We show that the bit-security of DFORS with respect to adaptive chosen message attacks is more than that of FORS by a factor of Inline graphic, where r is the number of signed messages per key under a given security level.

  • We analyze the security of DFORS with respect to adaptive chosen message adversaries, discuss its limitations, and report its theoretical computational and communication performance. Finally, we compare DFORS with FORS and other HORS variants.

Preliminaries

In what follows, we provide the notation and definitions used throughout the paper. FORS can be seen as a generalized instance of HORS and it inherits most of the specifications of HORS. Accordingly, for completeness, we provide a brief overview of the HORS signature scheme.

Notation

Let n denote our security parameter. Consider a finite key space Inline graphic, message space of arbitrary length Inline graphic, the two hash families H and G where Inline graphic, and Inline graphic. Inline graphic (resp. Inline graphic) is an Inline graphic-bit (resp. n-bit) keyed one-way function. Let the Inline graphic-bit message digest of an arbitrary length message Inline graphic be divided into Inline graphic elements, each of length Inline graphic bits, such that the integer representation of a given element is a subset of Inline graphic, where Inline graphic. We refer to the set Inline graphic by T, and the subset of Inline graphic-elements of the set T is denoted by Inline graphic. Let Inline graphic denote an Obtain Random Subset function which returns a Inline graphic element subset from the Inline graphic-bit hash value of a message m, formally defined as follows

graphic file with name M33.gif

The notion of ORS functions was introduced by Reyzin and Reyzin when HORS was proposed [23]. It has been shown that the security of the scheme is reduced to the subset resilience problem [23]. More precisely, for a given bit-security level, at most r messages can be signed before re-keying is required, otherwise an adversary can find a message whose ORS is covered by the union of the ORSs of the r messages.

Definition 1

The messages Inline graphic are in an r-subset-cover relation, Inline graphic, if the Obtain Random Subset of message Inline graphic Inline graphic is a subset of the union of all Obtain Random Subsets of the r-messages, Inline graphic, formally

graphic file with name M39.gif

If finding the above cover relation for a given ORS function is infeasible, then it is said that such a function is r-subset resilient.

Definition 2

An ORS function is r-subset-resilient if for any polynomial time adversary Inline graphic, the probability of finding Inline graphic such that Inline graphic is a subset of Inline graphic is negligible, Formally

graphic file with name M44.gif

Definition 3

An ORS function is r-target-subset-resilient, if for any polynomial time adversary Inline graphic who is given the ORSs of r messages Inline graphic, it is infeasible to find a message Inline graphic such that its Inline graphic-element Inline graphic is a subset of the union of ORSs of the r messages, formally

graphic file with name M50.gif

Hash to Obtain Random Subset (HORS) Few-Time Digital Signature Scheme

In HORS [23], the signer randomly generates t secret keys each of n-bit length, Inline graphic. Using a one-way function Inline graphic, the signer computes the public key, Inline graphic. For signing an arbitrary length message Inline graphic, Inline graphic is evaluated by dividing the Inline graphic-bit message digest value of Inline graphic into Inline graphic elements, each of length Inline graphic bits. Each element is represented by an integer Inline graphic where Inline graphic and Inline graphic, Inline graphic. To generate the signature, Inline graphic, the signer reveals the secret keys whose indices correspond to the integer representation of the Inline graphic elements in the ORS, i.e., Inline graphic. For verification, the verifier computes Inline graphic, then checks if Inline graphic, otherwise verification fails. The description of HORS is given in Algorithm 3 in Appendix A.

Security. Assuming that f is a one-way function, the security of HORS is reduced to the hardness of the (target) subset-resilience problem [23]. It has been shown that the probability of finding a message (Inline graphic) such that Inline graphic is covered by the obtained random subsets of the r previously signed messages is Inline graphic which corresponds to the probability of Inline graphic randomly chosen elements being a subset of the revealed Inline graphic secret keys. The corresponding bit-security is then

graphic file with name M74.gif

In [2], it was proven that the security of HORS with respect to adaptive chosen message attacks is

graphic file with name M75.gif

(see Appendix B). A practical example of a weak-message attack was also given where an adaptive adversary finds messages that map to subsets with repeated indices which results in smaller subsets, i.e., number of distinct elements Inline graphic. Such subsets are easier to cover and consequently, a 7-bit decrease in the expected security of SPHINCS against classical attacks was reported.

Variants. HORS++ [22] was introduced to provide security against adaptive attacks. A one-to-one mapping function S(m) that belongs to a cover-free family [13] is utilized to ensure that for any Inline graphic messages Inline graphic. Three constructions for S(m) based on polynomials over finite fields, error correcting codes, and algebraic curves over finite fields were presented. Consequently, HORS++ increases the signature size and the size of the secret keys to achieve the same security level of HORS against non-adaptive chosen message attacks. Moreover, the computational efficiency is decreased due to the computation of S(m). Later, PORS was suggested to replace HORS in SPHINCS where the idea of having distinct elements in subsets of weak messages was enforced by use of a pseudorandom bit generator to obtain the subsets [2]. However, although PORS mitigates weak-message attacks, it is still vulnerable to adaptive chosen message attacks under the definition given in Appendix B. Lastly, FORS was proposed and used in SPHINCSInline graphic [4], where security against weak-message attacks is achieved by increasing the key size from t values to Inline graphic values such that each index out of the Inline graphic indices in the ORS reveals a secret key from a different pool of t secret keys. Accordingly, when integrated in a tree structure the size of the signature also increases.

FORS Security Analysis

Unlike HORS which generates t secret keys from which the secret keys that are indexed by ORS(m) are released, FORS generates (Inline graphic) secret keys and dedicates t secret keys for each index out of the Inline graphic indices. By doing so, FORS mitigates weak message attacks because even if two elements in ORS(m) are equal, they index values from different secret key pools. The n-bit public key of FORS is the hash of the concatenation of Inline graphic Merkle tree roots. Each root is associated with a binary hash tree whose leaves are the hashes of t secret key elements in a given pool. Accordingly, one FORS instance has Inline graphic trees, each of height Inline graphic.

Figure 1 depicts the signatures of message 100 011 110 using (a) HORS and (b) FORS, where Inline graphic and Inline graphic. In FORS, the first 3 bits, i.e., 100, of the message selects Inline graphic, the secret key corresponding to the 4-th leaf indexed from the left and starting from 0 in the first tree along with its authentication path to Inline graphic. Similarly, the second (resp. third) 3 bits of the message selects Inline graphic (resp. Inline graphic) from the second (resp. third) tree with the authentication path to Inline graphic (resp. Inline graphic). In HORS, the three 3-bit parts of the message index Inline graphic, Inline graphic, and Inline graphic from the same tree, and with each selected secret key a 3 node authentication path is selected, hence the overlap in the node (colored in pale red and gray) at the pre-root level. More details about hash trees and authentication path calculations are provided in Sect. 4.

Fig. 1.

Fig. 1.

HORS and FORS signatures of the message 100 011 110 where Inline graphic and Inline graphic. The 8 rectangles under each tree depict the eight secret keys whose hashes are stored in the corresponding leaf nodes.

It can be verified from Fig. 1 that if two 3-bit parts of the message are equal, then the same secret key value is revealed in HORS. This fact is exploited in the weak messages attack where an adversary searches for messages that have as many repeated indices as possible, which lead to ORSs containing fewer distinct elements, and thus can be easily covered with the ORSs of the revealed r messages. However, this problem is mitigated in FORS because repeated indices select secret keys from different pools. In what follows, we investigate the security of FORS with respect to non-adaptive chosen message attacks.

FORS in a Non-adaptive Setting

Reyzin and Reyzin introduced clear attack models for analyzing HBFT signature schemes against (non) adaptive chosen message attacks [23]. Such models are used in the analysis of all HORS-variants, i.e., PORS, and FORS. Specifically, in a non-adaptive setting, also referred to by r-target subset resilience problem (see Definition 3), an adversary is required to first choose r messages Inline graphic, after which they are provided with key k of Inline graphic and allowed to select a message Inline graphic and evaluate Inline graphic. A successful non-adaptive chosen message attack happens when the adversary is able to find Inline graphic, i.e., find a message Inline graphic that is in an r-subset cover relation with Inline graphic. This scenario corresponds to an attacker who is trying to forge a signature after observing all r allowed signatures per key, or an adversary who is allowed r queries at a time before being supplied with k to verify any of the returned signatures. Few-time signature schemes are expected to maintain their security against forgery attacks even after releasing all r signatures.

Finding Inline graphic in FORS. Given an adversary who observed the signatures of r messages, finding a message Inline graphic that is in an Inline graphicsubset cover relation with the other r messages (Inline graphic has probability of success Inline graphic [6], which is equal to the probability that each Inline graphic-bit element out of the Inline graphic elements in Inline graphic is covered by an element at the same position of the ORSs of the other r messages, i.e., Inline graphic for Inline graphic, where Inline graphic denotes the i-th ORS element of the j-th message. Accordingly, the corresponding bit-security against non-adaptive chosen message attacks is given by

graphic file with name M118.gif

Adaptive Chosen Message Attack Against FORS

In this setting, an adversary is given the hash key k and allowed to evaluate Inline graphic for any message of their choice before selecting Inline graphic messages. This attack also indicates the r-subset resilience of the signature algorithm (see Definition 2). The definition of adaptive chosen message attack is given in Appendix B. Applying the same analysis to FORS, given the key k of Inline graphic, an adversary Inline graphic generates the ORSs of Inline graphic messages offline, where Inline graphic and Inline graphic, for Inline graphic Inline graphic searches for all possible combinations of Inline graphic message sets from the set of q messages. For any given Inline graphic messages combination, the probability that message Inline graphic is covered by the remaining r messages (i.e., Inline graphic), is Inline graphic. Accordingly, Inline graphic obtains Inline graphic sets of Inline graphic messages and each set gives Inline graphic possible choices for Inline graphic. Therefore, the probability of Inline graphic successfully generating Inline graphic is bounded from above by

graphic file with name M140.gif
graphic file with name M141.gif
graphic file with name M142.gif

which can be approximated by

graphic file with name M143.gif

Assuming a success probability close to 1, the above equation can be expressed as

graphic file with name M144.gif

Then the bit security of FORS with respect to adaptive chosen message attacks is given by

graphic file with name M145.gif

One may conclude that due to the offline adversarial advantage given to Inline graphic (i.e., knowledge of k implies the feasibility of evaluating ORSs for more than r messages of their choice), FORS bit security against adaptive chosen message attacks decreases by a factor of Inline graphic when compared to the non-adaptive setting. Note that, currently there is no attack against SPHINCSInline graphic that can utilize the offline adversarial privileges and produce Inline graphic messages in an r-subset cover relation. This is because SPHINCSInline graphic uses a fixed pseudorandom generation of the key k to get the obtained random subset Inline graphic. We also note that k is message dependent and is sent in the clear with each signature so verification takes place. Accordingly, in the event of attacks on the process by which k is evaluated from m, a dramatic decrease in the security of SPHINCSInline graphic will follow. Consequently, in the following section we present a technique that is robust against adaptive chosen message attacks on FORS. Our mechanism annihilates the adversarial offline advantages associated with knowing the hash key k.

Dynamic Forest of Random Subsets (DFORS)

In this section we present Dynamic Forest Of Random Subsets DFORS, a new HORS-variant that mitigates the offline advantage of an adversary which leads to the adaptive chosen message attack on FORS (discussed in Sect. 3). The main feature of DFORS is that the generation of the ORS is performed concurrently with signing such that each signature element is utilized to generate the next element of the ORS. In other words, signing and ORS generation are bound together using a chaining mechanism that utilizes the revealed secret keys. This procedure ensures that given a message, only the signer is able to efficiently generate an ORS. By doing so, even if an adversary has knowledge of k, they are not able to compute ORSs of a given message of their choice unless they have some secret key knowledge. In what follows we give a detailed specification of DFORS.

DFORS Parameters

DFORS uses the following parameters.

  • n :  The security parameter and the bit-length of (i) the secret seed SK.seed, (ii) secret keys Inline graphic (Inline graphic, Inline graphic), (iii) public key PK.root, and (iv) the output of the used one way function F, and hash function G.

  • Inline graphic The number of (i) sub-strings of the input message, (ii) secret key pools where each contains t secret keys, and (iii) hash trees.

  • Inline graphic The bit length of a sub-string of the input message and the hash tree height.

  • t :  the number of secret keys per pool and the number of leaves in each hash tree, t = Inline graphic.

The input message for DFORS is of length Inline graphic bits. To achieve n-bit security when signing r messages, we have Inline graphic (see Sect. 5.1).

Key Generation

In what follows, we give the specifications of the secret and public key generation procedures. Moreover, DFORS is described in Algorithm 2.

Secret Key Generation. Let SK.seed denote an n-bit secret seed that is sampled at random. Given a pseudorandom function, Inline graphic, the n-bit Inline graphic secret key values Inline graphic, Inline graphic, Inline graphic are generated by

graphic file with name M166.gif

where each set of t secret keys belong to one of the Inline graphic pools.

Hash Trees and Public Key Generation. Using one-way function Inline graphic applied on the secret keys Inline graphic, Inline graphic, Inline graphic, the leaf nodes of the Inline graphic hash trees are generated, Inline graphic. Every t leaves, Inline graphic, are combined together in a Merkle tree construction to form the j-th (out of Inline graphic) tree. Then, the roots of these Inline graphic trees, Inline graphic, are concatenated to form an input to the hash function to get the n-bit public key expressed as

graphic file with name M178.gif

Binary Hash Tree. DFORS uses the XMSS binary Merkle tree construction [9]. The height of the binary hash tree is Inline graphic. It has Inline graphic levels, Inline graphic leaf nodes (each of size n bits) on level 0, i.e., Inline graphic, and an n-bit root node on level Inline graphic. We denote the nodes in level j by Inline graphic where Inline graphic, Inline graphic and Inline graphic. To construct the tree, the hash function G and a 2n-bit mask, q, per hash evaluation are used. These bit masks are introduced to provide second-preimage resistance. The rationale for using different bit masks for each hash evaluation is to mitigate multi-target attacks [17]. For details on generating the hash keys Inline graphic and bit masks Inline graphic, the reader is referred to [4, 17]. Formally, for Inline graphic, a node Inline graphic is given by

graphic file with name M192.gif

Figure 2 shows a simplified example of one of the Inline graphic trees in DFORS with Inline graphic. Assuming it is the j-th tree, it depicts the nodes in the authentication path (colored in gray) associated with revealing Inline graphic.

Fig. 2.

Fig. 2.

A binary hash tree with the nodes in the authentication path (colored in gray) for leaf node Inline graphic (colored in black)

Signing and ORS Generation

We denote by Z(h) a function that takes as input Inline graphic bits, h, and outputs the j-th Inline graphic bits of h, where Inline graphic. Formally, Inline graphic, and letting Inline graphic, for Inline graphic

graphic file with name M203.gif

The signing algorithm takes as input the message m, the secret seed SK.seed, and the hash key k. It constructs the Inline graphic trees as explained above in Sect. 4.2. To compute the Inline graphic random subset Inline graphic, the algorithm first evaluates Inline graphic, then computes Inline graphic. The first element in the signature, Inline graphic, is comprised of i) the secret key of index Inline graphic in the first pool, Inline graphic, and ii) the corresponding authentication path Inline graphic, thus Inline graphic. Next, Inline graphic and Inline graphic are used to choose the second random element, Inline graphic, where Inline graphic. The second signature element, Inline graphic, is the secret key of index Inline graphic in the second pool, Inline graphic, and its corresponding authentication path Inline graphic, Inline graphic. In general, the i-th element of the Inline graphic is given by Inline graphic where Inline graphic. The i-th signature element, Inline graphic, is the secret key value of index Inline graphic in the i-th pool and its corresponding authentication path Inline graphic, Inline graphic, where Inline graphic. The above process is repeated until Inline graphic elements are generated Inline graphic. Finally, the signature is given by

graphic file with name M233.gif
graphic file with name M234.gif

The ORS generation and signing process is illustrated in Fig. 3.

Fig. 3.

Fig. 3.

The DFORS procedure to compute Inline graphic, where Inline graphic, Inline graphic, and Inline graphic is the Inline graphic-th secret key in the i-th secret key pool.

The authentication path of a leaf Inline graphic contains all the sibling nodes of the nodes in the path from the leaf Inline graphic to the tree root. It is required so that the verifier can successfully generate the root in order to verify the signature element Inline graphic related to the leaf node Inline graphic. Figure 2 shows a simple hash tree with the authentication path for leaf Inline graphic colored in black and the authentication path nodes colored in gray, Inline graphic.

Signature Verification

The verification algorithm takes as input the message m, the public key PK.root, the hash key K, and the signature Inline graphic Inline graphic. It computes Inline graphic, then Inline graphic to get the leaf index of the first hash tree. Then, it applies the one-way function F to the signature element Inline graphic of the signature Inline graphic to get the leaf node Inline graphic in the first tree. The authentication path Inline graphic and the leaf Inline graphic are used to compute the root of the first tree. The leaf index Inline graphic is required so that the verifier knows which node is concatenated on the right and on the left. The tree root calculation procedure is described in Algorithm 1. Generally, the verification algorithm computes the i-th tree root by applying Algorithm 1 on Inline graphic, Inline graphic, and the leaf index Inline graphic where Inline graphic, and Inline graphic. This process is repeated until Inline graphic tree roots are computed which are then concatenated to form an input to the hash function G. If the output of G is equal to PK.root, the signature is valid, otherwise verification fails.graphic file with name 495979_1_En_12_Figa_HTML.jpg graphic file with name 495979_1_En_12_Figb_HTML.jpg

Security and Efficiency

In what follows, we analyze the security of DFORS and demonstrate the effect of the dynamic chaining on the security of FORS. Afterwards, the computational cost of the DFORS key generation, signing, and verification algorithms are presented. The bit size of the signature and keys are also given.

DFORS Security Analysis

In this section, we present a detailed analysis of DFORS with respect to weak-message attacks and r-target subset resilience adversaries. More precisely, since the proposed chaining technique does not allow an adaptive adversary who has knowledge of k to compute the ORSs of any message of their choice before asking the signing oracle for its signature, DFORS is essentially r-subset resilient. Hence, our analysis focuses on its security when an adversary is given the signatures of r messages.

Weak-Message Attacks. DFORS inherits FORS mitigation to weak-message attacks [6] because it specifies an independent key pool for each index in the ORS. Consequently, even if an ORS element is repeated, the corresponding revealed secret keys will be different.

r-Target Subset Resilience. According to Definition 3, we assume an adversary Inline graphic when given the ORSs of r messages will return Inline graphic where Inline graphic. In what follows, we show that the success probability of Inline graphic is bounded from above by Inline graphic. Note that since ORS generation is secret key dependent, the ORS function of DFORS is intrinsically r-subset resilient. In other words, the value of any random ORS element, Inline graphic, depends on the previously revealed signature element Inline graphic and the original message m. Accordingly, without any oracle queries, Inline graphic has no feasible function to evaluate ORSs of messages of their choice. On the other hand, if Inline graphic is given the signatures of r messages or they queried r messages of their choice, they need to find a message Inline graphic such that each element in its obtained random subset, Inline graphic, is covered by the elements at the same corresponding positions in the ORSs of the other r messages

graphic file with name M273.gif

Due to the chaining process in generating Inline graphic, Inline graphic generates the ORSs sequentially. At any position i, if Inline graphic, then Inline graphic fails. In addition, they cannot evaluate Inline graphic when Inline graphic is not revealed by any of signatures of the r messages, Generally, for the i-th position in Inline graphic

graphic file with name M281.gif

where Inline graphic and Inline graphic denote the i-th signature element and i-th ORS element of the j-th message, respectively. Thus, the probability that Inline graphic finds Inline graphic successfully is equal to their probability of finding a message Inline graphic such that Inline graphic, each of the Inline graphic-bit Inline graphic. Since Inline graphic is given r messages, the probability of finding a cover for one Inline graphic is Inline graphic because this implies that Inline graphic. Thus, the probability of finding a cover for all the Inline graphic elements in Inline graphic is equal to the probability of finding a cover for the last element, Inline graphic, which is Inline graphic. Therefore

graphic file with name 495979_1_En_12_Equ27_HTML.gif

so the corresponding DFORS bit-security against adaptive chosen message attacks is

graphic file with name M298.gif

Compared to the adaptive chosen message attack security of FORS (See Sect. 3), the bit security of DFORS is higher by a factor of Inline graphic. The extra cost is performing Inline graphic more calls to the hash function. Unlike FORS, the signing procedure cannot be parallelized because of the chaining mechanism.

Theoretical Efficiency

  • Key Generation. This procedure requires Inline graphic PRF function computations to generate the t secret values for Inline graphic pools, Inline graphic one-way function F computations to compute the leaf nodes of the hash trees, and Inline graphic hash function G evaluations to evaluate the Inline graphic hash trees and get the public key PK.root.

  • Signing. This procedure requires Inline graphic PRF function computations, Inline graphic one-way function F computations, Inline graphic hash function (H and G) to compute the Inline graphic hash trees (Inline graphic hash G calls), and Inline graphic hash H calls to get Inline graphic. Note that the whole tree structure is computed with each signature, otherwise, the scheme storage requirements will be huge.

  • Verification. This procedure requires Inline graphic one-way function F computations that compute the trees leaves, Inline graphic) hash function (H and G) evaluations to reconstruct the Inline graphic trees roots from the revealed secret values and the authentication paths (Inline graphic calls to G), and Inline graphic calls H to get Inline graphic.

  • Signature Size. The signature contains Inline graphic secret key elements and Inline graphic tree node for the associated authentication paths. Thus, the signature size is Inline graphic bits, where n is the bit size of each secret keys and hash tree node.

  • Length of Keys. The size of the secret key, SK.root, is equal to that of the public key, PK.root, and it is n bits.

The computational complexities of the above procedures are given in Table 2.

Table 2.

Comparison between HORS, PORS, FORS, and DFORS

Algorithm KGen (# OWF)Inline graphic Signing cost Verification cost Signature sizeInline graphic SK/PK sizeInline graphic Adaptive security
HORST t PRF t PRF Inline graphic 1 NO
t OWF t OWF Inline graphic OWF
Inline graphic Hash t Hash Inline graphic Hash
PORSInline graphic t PRF Inline graphic PRF Inline graphic 1 NO
t OWF t OWF Inline graphic OWF
Inline graphic Hash t Hash Inline graphic Hash
FORS Inline graphic PRF Inline graphic PRF Inline graphic 1 NO
Inline graphic OWF Inline graphic OWF Inline graphic OWF
Inline graphic Hash Inline graphic Hash Inline graphic Hash
DFORS Inline graphic PRF Inline graphic PRF Inline graphic 1 YES
Inline graphic OWF Inline graphic OWF Inline graphic OWF
Inline graphic Hash Inline graphic Hash Inline graphic Hash

Inline graphic OWF denotes one-way function.

Inline graphic Size is given as a factor of n bits.

Inline graphic Inline graphic for optimal signature size in case of HORST and for the upper bound on the signature size in PORS.

Inline graphic Verification cost and signature size are the upper bound values.

Comparison with HORS Variants

DFORS inherits all the advantageous security properties of FORS. Additionally, it is secure against adaptive chosen message attacks. In fact, for the same parameters the bit-security of DFORS with respect to adaptive chosen message adversaries is equal to that of FORS under non-adaptive chosen message attacks. Table 1 gives a comparison between the bit security level of FORS and DFORS in an adaptive adversarial setting. We use the recommended parameters (i.e., n, Inline graphic, and Inline graphic) for all six instances of SPHINCSInline graphic.

Table 1.

DFORS and FORS security levels for an adaptive chosen message attack using the SPHINCSInline graphicparameters for different numbers of signed messages

SPHINCSInline graphic instance Inline graphic Inline graphic FORS DFORS
Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
SPHINCSInline graphic-128s 15 10 75 47 27 15 150 140 130 120
SPHINCSInline graphic-128f 9 30 135 80 43 22 270 240 210 180
SPHINCSInline graphic-192s 16 14 112 70 40 22 224 210 196 182
SPHINCSInline graphic-192f 8 33 132 77 41 20 264 231 198 165
SPHINCSInline graphic-256s 14 22 154 95 54 29 308 286 264 242
SPHINCSInline graphic-256f 10 30 150 90 49 25 300 270 240 210

Table 1 shows the significant effect of increasing the number of signed messages, r, on the bit security of FORS. On the other hand, this effect is very reasonable with DFORS. For instance, when Inline graphic, an adaptive attack on FORS is equivalent to a collision attack on the underlying Inline graphic-bit hash function H which has a complexity of Inline graphic evaluations. However, due to the r-subset resilience of DFORS where finding a covered ORS requires successive dependency on the signature elements, an adversary must find a second preimage of the ORS in the revealed secret keys, hence the complexity is Inline graphic evaluations.

Table 2 presents a comparison between DFORSand other HORS variants with respect to their computational efficiency, signature and key sizes, and security against adaptive chosen message attacks.

Conclusion

We analyzed the security of FORS, the underlying hash-based few-time signing scheme of SPHINCSInline graphic, with respect to adaptive chosen message attacks. We showed that as the number of signed messages, r, increases, its bit-security with respect to adaptive chosen message adversaries decreases significantly compared to its non-adaptive counterpart. As a solution, we proposed DFORS, which builds on FORS but utilizes a secret key dependent ORS function. Such a function binds the process of generating the ORS with signing which makes it feasible only for the signer. Accordingly, we showed that the bit security of DFORS against adaptive chosen message attacks is more than that of FORS by a factor of Inline graphic. Note that our analysis does not affect the claimed security of SPHINCSInline graphic  but rather provides a better understanding of the security of its underlying signing scheme and offers a mechanism that can be adopted by most HORS variants to provide security against adaptive chosen message attacks.

Acknowledgment

The authors would like to thank the reviewers for their valuable comments that helped improve the quality of the paper.

A HORS Specification

The HORS key generation, signing, and verification procedures are given in Algorithm 3.graphic file with name 495979_1_En_12_Figc_HTML.jpg

B Adaptive Chosen Message Attack against HORS

In [23], the following adaptive chosen message attack against HORS was defined. Let Inline graphic be an adaptive chosen message adversary against HORS such that given the key k, Inline graphic can compute the hash of any message m and Inline graphic offline. Given a security parameter, n, under the birthday paradox, Inline graphic can find Inline graphic messages in a cover relation Inline graphic with which to query the signing oracle, formally

graphic file with name M392.gif

Aumasson and Endignoux [2] subsequently presented an adaptive chosen message attack against HORS and proved that the security level decreases by a factor of Inline graphic when compared to non adaptive chosen message attacks. Their attack is as follows. Given an adversary Inline graphic and a key k, the hash value Inline graphic for any message of their choice can be computed, and say there are Inline graphic messages. For all possible combinations of Inline graphic messages from the q messages, Inline graphic searches for Inline graphic such that

graphic file with name M400.gif

For any given subset, the probability of being an r-subset-cover relation is Inline graphic. The number of Inline graphic-message combinations which Inline graphic can construct from the q messages are Inline graphic and each combination can form Inline graphic choices. Accordingly, their probability of success in defeating the r-subset resilience (SR) is given by

graphic file with name M406.gif

Assuming a success probability close to 1, the security level of HORS against an adaptive chosen message attack is

graphic file with name M407.gif

Contributor Information

Abderrahmane Nitaj, Email: abderrahmane.nitaj@unicaen.fr.

Amr Youssef, Email: youssef@ciise.concordia.ca.

Riham AlTawy, Email: raltawy@uvic.ca.

References

  • 1.Arute F, et al. Quantum supremacy using a programmable superconducting processor. Nature. 2019;574(7779):505–510. doi: 10.1038/s41586-019-1666-5. [DOI] [PubMed] [Google Scholar]
  • 2.Aumasson, J.-P., Endignoux, G.: Clarifying the subset-resilience problem. IACR Cryptology ePrint Archive, p. 909 (2017)
  • 3.Aumasson J-P, Endignoux G. Improving stateless hash-based signatures. In: Smart NP, editor. Topics in Cryptology – CT-RSA 2018; Cham: Springer; 2018. pp. 219–242. [Google Scholar]
  • 4.Bernstein, D., et al.: SPHINCS+-submission to the NIST post-quantum project (2017)
  • 5.Bernstein DJ, et al. SPHINCS: practical stateless hash-based signatures. In: Oswald E, Fischlin M, et al., editors. Advances in Cryptology – EUROCRYPT 2015; Heidelberg: Springer; 2015. pp. 368–397. [Google Scholar]
  • 6.Bernstein, D.J., Hülsing, A., Kölbl, S., Niederhagen, R., Rijneveld, J., Schwabe, P.: The SPHINCS+ signature framework. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 2129–2146 (201 9)
  • 7.Bonnetain X, Hosoyamada A, Naya-Plasencia M, Sasaki Y, Schrottenloher A. Quantum attacks without superposition queries: the offline simon’s algorithm. In: Galbraith SD, Moriai S, editors. Advances in Cryptology – ASIACRYPT 2019; Cham: Springer; 2019. pp. 552–583. [Google Scholar]
  • 8.Buchmann J, Dahmen E, Ereth S, Hülsing A, Rückert M. On the security of the Winternitz one-time signature scheme. In: Nitaj A, Pointcheval D, editors. Progress in Cryptology – AFRICACRYPT 2011; Heidelberg: Springer; 2011. pp. 363–378. [Google Scholar]
  • 9.Buchmann J, Dahmen E, Hülsing A. XMSS - a practical forward secure signature scheme based on minimal security assumptions. In: Yang B-Y, editor. Post-Quantum Cryptography; Heidelberg: Springer; 2011. pp. 117–129. [Google Scholar]
  • 10.Centre, NCSR: Round 2 submissions - Post-quantum cryptography (2019). https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions
  • 11.Ducas L, Durmus A, Lepoint T, Lyubashevsky V. Lattice signatures and bimodal Gaussians. In: Canetti R, Garay JA, editors. Advances in Cryptology – CRYPTO 2013; Heidelberg: Springer; 2013. pp. 40–56. [Google Scholar]
  • 12.ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory. 1985;31(4):469–472. doi: 10.1109/TIT.1985.1057074. [DOI] [Google Scholar]
  • 13.Erdös P, Frankl P, Füredi Z. Families of finite sets in which no set is covered by the union of Inline graphic others. Isr. J. Math. 1985;51(1):79–89. doi: 10.1007/BF02772959. [DOI] [Google Scholar]
  • 14.Hülsing A. W-OTS+ – shorter signatures for hash-based signature schemes. In: Youssef A, Nitaj A, Hassanien AE, editors. Progress in Cryptology – AFRICACRYPT 2013; Heidelberg: Springer; 2013. pp. 173–188. [Google Scholar]
  • 15.Hülsing A, Busold C, Buchmann J. Forward secure signatures on smart cards. In: Knudsen LR, Wu H, editors. Selected Areas in Cryptography; Heidelberg: Springer; 2013. pp. 66–80. [Google Scholar]
  • 16.Hülsing A, Rausch L, Buchmann J. Optimal parameters for XMSSMT. In: Cuzzocrea A, Kittl C, Simos DE, Weippl E, Xu L, editors. Security Engineering and Intelligence Informatics; Heidelberg: Springer; 2013. pp. 194–208. [Google Scholar]
  • 17.Hülsing A, Rijneveld J, Song F. Mitigating multi-target attacks in hash-based signatures. In: Cheng C-M, Chung K-M, Persiano G, Yang B-Y, editors. Public-Key Cryptography – PKC 2016; Heidelberg: Springer; 2016. pp. 387–416. [Google Scholar]
  • 18.Johnson D, Menezes A, Vanstone S. The elliptic curve digital signature algorithm (ECDSA) Int. J. Inf. Secur. 2001;1(1):36–63. doi: 10.1007/s102070100002. [DOI] [Google Scholar]
  • 19.Lamport, L.: Constructing digital signatures from a one-way function. Technical report, CSL-98, SRI International Palo Alto (1979)
  • 20.Merkle RC. A certified digital signature. In: Brassard G, editor. Advances in Cryptology — CRYPTO’ 89 Proceedings; New York: Springer; 1990. pp. 218–238. [Google Scholar]
  • 21.Perrig, A.: The BiBa one-time signature and broadcast authentication protocol. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 28–37 (2001)
  • 22.Pieprzyk J, Wang H, Xing C. Multiple-time signature schemes against adaptive chosen message attacks. In: Matsui M, Zuccherato RJ, editors. Selected Areas in Cryptography; Heidelberg: Springer; 2004. pp. 88–100. [Google Scholar]
  • 23.Reyzin L, Reyzin N. Better than BiBa: short one-time signatures with fast signing and verifying. In: Batten L, Seberry J, editors. Information Security and Privacy; Heidelberg: Springer; 2002. pp. 144–153. [Google Scholar]
  • 24.Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM. 1978;21(2):120–126. doi: 10.1145/359340.359342. [DOI] [Google Scholar]
  • 25.Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of the Annual Symposium on Foundations of Computer Science, pp. 124–134 (1994)
  • 26.Song F. A note on quantum security for post-quantum cryptography. In: Mosca M, editor. Post-Quantum Cryptography; Cham: Springer; 2014. pp. 246–265. [Google Scholar]
  • 27.Li YX, Deng RH, Wang XM. On the equivalence of McEliece’s and Niederreiter’s public-key cryptosystems. IEEE Trans. Inf. Theory. 1994;40(1):271–273. doi: 10.1109/18.272496. [DOI] [Google Scholar]

Articles from Progress in Cryptology - AFRICACRYPT 2020 are provided here courtesy of Nature Publishing Group

RESOURCES