Skip to main content
F1000Research logoLink to F1000Research
. 2021 Sep 16;10:931. [Version 1] doi: 10.12688/f1000research.72910.1

Digital signature schemes with strong existential unforgeability

Jason Chia 1,a, Ji-Jian Chin 2,b, Sook-Chin Yip 1,c
PMCID: PMC9925878  PMID: 36798451

Abstract

Digital signature schemes (DSS) are ubiquitously used for public authentication in the infrastructure of the internet, in addition to their use as a cryptographic tool to construct even more sophisticated schemes such as those that are identity-based. The security of DSS is analyzed through the existential unforgeability under chosen message attack (EUF-CMA) experiment which promises unforgeability of signatures on new messages even when the attacker has access to an arbitrary set of messages and their corresponding signatures. However, the EUF-CMA model does not account for attacks such as an attacker forging a different signature on an existing message, even though the attack could be devastating in the real world and constitutes a severe breach of the security system. Nonetheless, most of the DSS are not analyzed in this security model, which possibly makes them vulnerable to such an attack. In contrast, a better security notion known as strong EUF-CMA (sEUF-CMA) is designed to be resistant to such attacks. This review aims to identify DSS in the literature that are secure in the sEUF-CMA model. In addition, the article discusses the challenges and future directions of DSS. In our review, we consider the security of existing DSS that fit our criterion in the sEUF-CMA model; our criterion is simple as we only require the DSS to be at least secure against the minimum of existential forgery. Our findings are categorized into two classes: the direct and indirect classes of sEUF-CMA. The former is inherently sEUF-CMA without any modification while the latter requires some transformation. Our comprehensive  review contributes to the security and cryptographic research community by discussing the efficiency and security of DSS that are sEUF-CMA, which aids in selecting robust DSS in future design considerations.

Keywords: Cryptography, Digital Signatures, Strong Existential Unforgeability

Introduction

The idea of a digital signature scheme (DSS) was proposed by Diffie and Hellman in 1976 as a necessity to design efficient authenticated electronic communications which can serve as legal evidence in the court of law. 1 Rivest, Shamir, and Adleman realized the idea in their seminal work known as the RSA cryptosystem, 2 the first of many. A DSS consists of three processes, as shown in Figure 1.

Figure 1. The three processes of a digital signature scheme and the relationship between the input/outputs.

Figure 1.

For every ( sk, pk) ← keygen(1 k) and every m, verify(sign( m, sk), m, pk) = 1 must hold. A σ on m is valid if verify( σ, m, pk) = 1. This is a standard (informal) definition of DSS. 3 In the early 90s, a paradigm known as hash-then-sign forms the industry standard for issuing digital signatures. 4 The idea is to sign on the hash of a message, hH(m) instead of the m itself; this has a few benefits for h is constant size, which leads to efficient signing on speed and a constant sized signature. Verification would then require the verifiers to first validate the signed hash, then perform hashing hH(m) before finally comparing h′ and h. Concrete examples of the hash-then-sign are discussed in. 5- 15

Properties of DSS

The following properties are required by DSS 3 :

  • Public verifiability: A signature σ generated from a private key sk can be verified using a public key pk. This property differentiates DSS from other integrity protection mechanisms, such as message authentication codes (MAC). A consequential result from this property is that signatures are also transferrable, meaning a party can copy σ and pk to use it to convince others that the message is authentic from the signer.

  • Non repudiation: A signer cannot later deny that they have authenticated a message m once the signature of m, σ is generated and known. This is also another property that separates DSS from MAC, because the only entity that could have plausibly generated the signature in the case of DSS must possess the private key sk; whereas in a MAC scheme, the keys are shared. This property also implies that only the one in posession of sk can generate valid signatures, which disallows forgeries.

Message recovery

Notice that the verification process requires both the message and the signature as inputs, requiring the signer to transmit both. Alternatively, some DSS can support message recovery. DSS with message recovery (DSS-R) has a different sign and verification process, shown in Figure 2; the signer only needs to transmit a packed signature ρ, and the verifier would recover the message m successfully or abort ⊥ depending on signature validity. For practical purposes, | ρ|≤| σ| + | m|. Examples of DSS-R are found in previous literature. 16- 23

Figure 2. Sign and verify process for a digital signature scheme with message recovery.

Figure 2.

Security models

The security of DSS was first formalized by Goldwasser, Micali and Rivest in 1988. 24 Different security goals are used to model the different security guarantees of a DSS when faced with an adversary. The commonly accepted goal to model against is the goal of existential forgery (EUF), which is the easiest for attackers to achieve among other goals (e.g., selective forgery, total break). In addition, 24 defined the adversarial capabilities for a DSS, which aims to model what types of attacks can be carried out by an adversary when attempting to break the DSS. The strongest capability, known as adaptive chosen message (CMA) is the widely accepted adversarial capability that is the most used in the literature on DSS. Figure 3 shows the interactions of a challenger and an adversary in the EUF-CMA model. In step (1), the challenger sets up an empty set Q and gives the pk to the adversary. In step (2), the adversary may make oracle queries that model its chosen message attack capability. The queried messages are added to the set Q. In step (3), the adversary announces to the challenger the target message m* it wants to forge. m* must not be an element of Q, nor it can be queried to the oracle; this prevents trivial attacks which uses the oracle to break the security goal. Note, step (4) allows the adversary to use the signing oracle again, which models the adaptive nature of the attack. Finally, in step (5), the adversary outputs a forgery σ*. We say the adversary breaks the DSS if σ* on m* is valid. q s quantifies the number message-signature pair made available to the adversary.

Figure 3. EUF-CMA security model.

Figure 3.

Strong existential unforgeability (sEUF-CMA)

Consider the case for randomized signatures in the EUF-CMA model (e.g., DSA 13 or PSS-R 18 ). A randomized DSS allows multiple valid signatures for a single message, which has a subtle implication on the model: Suppose that the adversary queried for a message-signature pair ( m,σ). Now, the adversary forges a different valid signature σ′ ≠ σ on the same message m. This is an easier security goal, but could be a critical vulnerability when the DSS is used in a scenario in which the designers assumed that no new signatures can be forged, because a different signature on an existing message is still new. In other words, EUF-CMA does not guarantee that if that an attacker knows ( m,σ), it cannot forge ( m,σ′) such that σ′ on m is valid. This gave rise to a stronger security model, known as strong existential unforgeability or sEUF-CMA. 25 Figure 4 shows the interactions of the adversary with the challenger in the sEUF-CMA model. The main difference is the constraint during the chosen message attacks and in the final step (5). Notably, the adversary can even query for signatures on the challenge message m*, but may not submit any of the signatures obtained from the sign oracle as forgeries. In contrast to EUF-CMA, sEUF-CMA ensures that an adversary cannot produce any new signatures at all; any valid signature must have originated from the signer.

Figure 4. sEUF-CMA security model.

Figure 4.

Why does sEUF-CMA matter?

Let’s take a step back and consider why sEUF-CMA is even worth considering in the first place. DSS is very often used as a building block to construct other cryptographic schemes. For example, using the Fiat-Shamir transform, 26 a DSS can be turned into an identification protocol. DSS has also been used to create identity-based identification schemes, 27 signcryption schemes, 25 authenticated key exchanges, 28 and identity-based encryption schemes. 29 DSS with EUF-CMA security is found to be insufficient in some of the constructions, particularly to build non-malleable cryptographic schemes. In a nutshell, non-malleability refers to the impossibility of an adversary to generate a different ciphertext to some previously known ciphertext that decrypts to the same message, which is a desirable property in cryptographic schemes. 30 Thus, if a DSS is sEUF-CMA, it is much more versatile because it can be useful as a building block for many of the schemes which requires the property of non-malleability.

A simple attack for when a DSS is not sEUF-CMA

We show a toy example of a simple attack that can be achieved by an attacker if the DSS used for authentication is not sEUF-CMA. Figure 5 shows honest users Alice and Bob, as well as an attacker Mallory which has hijacked the channel. In step (1), Bob wants to authenticate that Alice is truly on the other end. Mallory launches a chosen message attack in step (2) and (3) on Alice and obtains the message m and signature σ. In step (4), Mallory forwards ( m,σ) to Bob, which may initially convince them. After some time elapsed, Bob wants to re-authenticate Alice to ensure that they are still who they claim to be (5). Mallory forges a valid signature σ′ ≠ σ on m and forwards that to Bob (6). From Bob’s perspective, Alice generating a different signature ought to warrant some confidence that Alice is truly Alice. However, if the DSS is not sEUF, this is not the case, as Bob is obviously duped.

Figure 5. A simple problem on a digital signature schemes without sEUF-CMA.

Figure 5.

Real life problems arising from signature malleability (non-sEUF)

We established sEUF-CMA is of theoretical interest. Here we briefly mention a few real-life needs for sEUF-CMA to emphasize the importance of it. Not too long ago, Stern et al. showed how to duplicate ECDSA signatures based on their malleability. 31 A more recent example is the transaction malleability of the popular cryptocurrency, Bitcoin. When a transaction in Bitcoin is signed, the signature does not cover the entire transaction used for hashing; an attacker could perform strong forgery (i.e., maul the signature), then claim that the transaction has failed (because the hash is not valid). The sender would believe it because the signature is valid! This leads to the sender issuing a new transaction, without knowing that the original transaction is valid. 32, 33 Decker and Wattenhofer pointed out that this subtle flaw could be responsible for a small portion of Bitcoins stolen during the 2014 MtGox attack. 34 They remarked that transaction malleability should be carefully considered when implementing Bitcoin clients. In another research, Jackson et al. found that signatures that are not sEUF-CMA may cause the strong session agreement of a well-known authenticated key exchange algorithm, the STS-ISO 1 to fail. 36 They analyzed STS-ISO using the Tamarin Prover and found that if sEUF is violated, attackers can force the parties in the session to accept message that do not originate from either of the honest parties.

DSS secure in sEUF-CMA

The notion of sEUF-CMA first appeared in the form of non-malleability of ciphertexts in the works of Dolev, Dwork and Naor 30 in 1991. The term sEUF-CMA was first introduced by An, Dodis and Rabin which presented it as requirement to construct signcryption schemes. 25 Boneh, Shen and Waters were the first DSS that is considered and proven in the sEUF-CMA model, 37 but mentions that DSS that are sEUF-CMA have existed earlier such as full domain hash (FDH)-RSA. 18 FDH-RSA must be sEUF-CMA because the signatures generated are determined exactly by the message only. This means that FDH-RSA signatures are deterministic. For deterministic signatures, a strong forgery cannot occur without the message m′ being different from the original m, therefore, deterministic signatures are generally sEUF-CMA. We see that this is also the case for the widely used and popular EdDSA which had recently received a provable security treatment. 38 Boneh, Shen and Waters shows that non-deterministic signatures may also exhibit sEUF-CMA, such as the Micali-Reyzin signatures, 39 Goh-Jarecki signatures 40 and Boneh-Boyen signatures. 11 The reason for this is that if the forger manages to re-randomize a signature on the same message, the signature constitutes an existential forgery through clever binding of the messages. This is a recurring paradigm to design sEUF-CMA signature schemes. 11, 41 Since the introduction of the sEUF-CMA model, existing EUF-CMA secure DSS are now re-considered in the sEUF-CMA model. An example of such work is by Fersch, Kiltz and Poettering on the well established DSA. 13 DSA was shown to be secure under sEUF-CMA, while ECDSA was not 2 . 43 More recently in 2021, Brendel et al. proved the IETF version of EdDSA to be sEUF-CMA secure. 38 Table 1 shows a list of DSS that are secure under sEUF-CMA.

Table 1. DSS that are directly sEUF-CMA.

Scheme Req. Sec. Assump Sign Cost Ver. Cost Sig. len. M.R. Std.
Lamport 44 N/A 1-way functions |1k| hash/0 |1k| hash |m|×|hash(⋅)|
DSA 13, 43 random oracle DLP 0/ex ex 2| q |
FDH-RSA 18 random oracle RSA 0/ex ex | n |
CS99 45 N/A Strong RSA 0/4ex 4ex 3| n |
BLS01 9 random oracle GDH 0/ex pair |G|
BMS03 46 N/A CDH ex( log2nm )/ex (pair + ex)( log2nm +1) (log2nm+1)|G|
GJ03 47 random oracle DDH 0/2ex 2ex 2| q |
KW03 47 random oracle RSA 0/ex ex | n |
BB04 11 N/A Strong DH 0/ex pair |G|+|q|
mNR04 48, 49 N/A GGM 0/ex 2ex 2| q |
GJK +07-1 50 random oracle CDH 0/3ex 2ex G — + 2| q | + 1
GJK +07-2 50 random oracle DDH 2ex/0 2ex 2| q |
TP09 51 random oracle RSA & DLP 0/2ex 3ex 2| n |
AGH +11 52 N/A GGM 0/(2+kmn)ex (kmn)pair 3|G|
EdDSA 38, 53 random oracle ECDLP 0/2ex 2ex 2|G|
NTC19 54 random oracle 1-way trapdoor sampleable relations 0/2ex 2ex |G|+1

Req. - Requirements; Sec. Assump - Security Assumptions; Sign Cost is partitioned into off-line/on-line costs, separated by a slash /; Ver. Cost - Verification Cost; Sig. Len. - Signature Length; M.R. - Supports message recovery; Std. - Standard Model as oppose to random oracle model; DLP - Discrete Logarithm Problem; RSA - RSA problem; GDH - Gap Diffie-Hellman; CDH - Computational Diffie-Hellman; ECDLP - Elliptic Curve Discrete Logarithm Problem; GGM - Generic Group Model; DDH - Decisional Diffie-Hellman Problem; ex - Exponentiation (or equivalent to point multiplication in elliptic curves); pair - Pairing operation; hash - hash operation; G group element; q integer of order q (a scalar in elliptic curves); Gx X coordinate of elliptic curve point; n m total number of messages; k mn key matrix size (see 52 ); Costs ignore cheap operations such as integer multiplication/addition or elliptic curve point addition/doubling. Whenever possible, the Strauss-Shamir optimization is applied (see 55 ).

Message recovery

From another perspective, we consider DSS with message recovery (DSS-R) candidates under sEUF-CMA. As pointed out by Ateniese and de Mediros, the modified Nyberg-Rueppel signature is sEUF-CMA secure. 49 While it is tempting to think that DSS-R must be sEUF-CMA, because modifying the signature will surely modify the message itself given that one can recover the message from the signature. However, we see that this is not the case as Ateniese and de Mediros found the original Nyberg-Rueppel signatures 49 to be insecure in sEUF-CMA.

Conversions to sEUF-CMA

Boneh, Shen and Waters opened a new field in the research of DSS under sEUF-CMA: Interest in sEUF-CMA conversion starts to accumulate with various works being published. 41, 56- 58 Instead of working on individual DSS, the line of research focuses on creating efficient conversions to enhance existing generic DSS with EUF-CMA into sEUF-CMA. Some transforms do not even need EUF-CMA security at minimum, only requiring EUF-GMA, which is a weaker notion than EUF-CMA. 59, 60 Table 2 shows a list of conversion methods since 2006, including the use of DSS in leakage resilient settings. 61- 64

Table 2.

Conversions that produces DSS with sEUF-CMA.

Scheme DSS Req. Add. Req. Sec. Assump Sign Cost Ver. Cost Sig. len. Std.
MR00 39 factoring-based Fiat-Shamir random oracle integer fact. 0/2ex 2ex 2| q |
BSW06 37 EUF-CMA, partitioned randomized trapdoor CDH + trapdoor 0/sg + ex + td vf + ex + td |σ| + | q |
TOO06-1 56 EUF-CMA random oracle DLP sg + ex/0 vf + ex |σ| + | q |
TOO06-2 56 EUF-CMA collision resistant hash DLP + collision resist sg + ex/0 vf + ex |σ| + 2| q |
SPW07 57 EUF-CMA strong randomized trapdoor trapdoor 0/sg + 2td vf + 2td |σ| + | q |
BS07 41 EUF-CMA 2-tier DSS EUF-CMA of 2-tier DSS 0/2sg + kg 2vf 2|σ| + |pk|
Goldreich 65 EUF-CMA 1-time DSS strong 1-time EUF DSS sg( log2nm )/sg vf (log2nm + 1) (log2nm)(|σ| + |pk|)
HWZ07 58 EUF-CMA 1-time DSS strong 1-time EUF DSS sg + kg/sg 2vf 2|σ| + |pk|
LKZ + 08-S 59 EUF-GMA, deterministic N/A N/A sg + kg/sg 2vf 2|σ| + |pk|
LKZ + 08-P 59 EUF-GMA, deterministic N/A N/A sg/sg 2vf 2|σ| + |1k|
LAS + 10 60 EUF-GMA/CMA GTOW chameleon hash one-wayness of GTOW hash sg/td vf + td |σ| + | q |
DSS with leakage resilience under sEUF-CMA
KV09-2.1 61 Lamport DSS 1-time use 1-way functions |1k| hash/0 |1k| hash |m|×|hash(⋅)|
WT14 62 EUF-FLR strong randomized trapdoor trapdoor leakage resilience 0/sig + 2td vf + 2td |σ| + | q |
WT15 63 EUF-FLR strong randomized trapdoor trapdoor leakage resilience 0/sig + 2td + pair + ex vf + 2td |σ| + |q| + |G| + |π|
HHP16 64 EUF-FLR 1-time EUF-FLR DSS strong 1-time EUF-FLR DSS sg + kg/sig 2vf 2|σ| + |pk|

DSS Req. - Requirement for DSS before using the conversion; Add. Req. - Additional requirements; EUF-GMA - Existential Unforgeability under Generic Chosen Message Attack; GTOW - Given Target One-Wayness (See 60 ); EUF-FLR - Existential Unforgeability with Full Leakage Resilience; sg - signature generation cost; td - trapdoor operation cost; kg - key generation cost; 1 k - security parameter; vf - signature verification cost; σ - underlying signature length; pk underlying signature public key length; π - Groth-Sahai proof statement (See 66 ).

Widely used DSS that have malleable signatures

Through our research, we investigated some of the most used DSS in the industry on their security in the sEUF-CMA model. The following are the popular DSS that are not sEUF-CMA secure.

  • 1.

    RSA PKCS#1.5 67

  • 2.

    ECDSA 31, 43

  • 3.

    Ed25519 (Original, not IETF RFC 8032) 38

Challenges and future direction

In recent work, there has been several post-quantum cryptographic DSS that incorporates the sEUF-CMA model during design. 68- 71 DSS in various other contexts (e.g., privacy preserving computation, multiparty computation) such as a homomorphic DSS, 72 group DSS, 73 and proxy DSS 74- 76 are being considered in sEUF-CMA as well. In addition, DSS in even more complex cryptographic settings such as in certificateless and identity-based settings are also using sEUF-CMA as their standard model for security. 77- 80 We see that the security goal post has been moved from EUF-CMA to sEUF-CMA in the span of a decade and believe this is the right direction forward as DSS is increasingly used in intricate security protocols, which cannot tolerate any design flaw that arises from as simple as malleable signatures.

Conclusion

In this work, we provided a comprehensive review on what is strong unforgeability in DSS, why is it needed, which of the DSS are secure under the model and how to obtain it if the DSS is only existentially unforgeable. We surveyed and analyzed existing DSS in literature which are secure under sEUF-CMA, and noted the requirements, computational and storage efficiency as well as the security assumptions of each DSS to provide an overview of DSS under the much more secure model.

Data availability

No data is associated with this article.

Acknowledgements

We would like to acknowledge our research funder: This research is supported by the Ministry of Higher Education of Malaysia through the Fundamental Research Grant Scheme under Grant FRGS/1/2019/ICT04/MMU/02/5 and in part by Multimedia University’s Research Management Fund.

Funding Statement

This research is supported by the Ministry of Higher Education of Malaysia through the Fundamental Research Grant Scheme under Grant FRGS/1/2019/ICT04/MMU/02/5 and in part by Multimedia University’s Research Management Fund.

The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

[version 1; peer review: 2 approved]

Footnotes

1

STS stands for Station-to-Station and is an authenticated key exchange protocol due to Diffie et al. 35

2

Brown proved ECDSA to secure under sEUF-CMA, 42 but this was refuted through a series of trivial attacks posed by. 43

References

  • 1. Diffie W, Hellman M: New directions in cryptography. IEEE Trans. Inf. Theor. September 2006;22(6):644–654. . 10.1109/TIT.1976.1055638 [DOI] [Google Scholar]
  • 2. Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM February 1978;21(2):120–126. . 10.1145/359340.359342 [DOI] [Google Scholar]
  • 3. Katz J, Lindell Y: Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series). Chapman & Hall/CRC;2007. 1584885513. [Google Scholar]
  • 4. Kaliski B: PKCS #1: RSA Encryption Version 1.5. RFC 2313, March 1998. Reference Source
  • 5. Bellare M, Rogaway P: Random oracles are practical: A paradigm for designing efficient protocols. Proc 1st ACM Conf Computer Communications Security. , CCS ’93, New York, NY, USA: Association for Computing Machinery;1993; page62–73. 0897916298. 10.1145/168588.168596 [DOI] [Google Scholar]
  • 6. Gennaro R, Halevi S, Rabin T: Secure hash-and-sign signatures without the random oracle. In: Stern J, editor Advances in Cryptology — EUROCRYPT ’99. Berlin, Heidelberg: Springer Berlin Heidelberg;1999; pages123–139. 978-3-540-48910-8. [Google Scholar]
  • 7. Cramer R, Shoup V: Signature schemes based on the strong rsa assumption. ACM Trans. Inf. Syst. Secur. August 2000;3(3):161–185. . 10.1145/357830.357847 [DOI] [Google Scholar]
  • 8. Kaliski B, Staddon J: PKCS #1: RSA Cryptography Specifications Version 2.0. RFC 2437. October 1998. Reference Source [Google Scholar]
  • 9. Boneh D, Lynn B, Shacham H: Short signatures from the weil pairing. In: Boyd C, editor, Advances in Cryptology — ASIACRYPT 2001. Berlin, Heidelberg: Springer Berlin Heidelberg;2001; pages514–532. 978-3-540-45682-7. [Google Scholar]
  • 10. Waters BR: Efficient identity-based encryption without random oracles. Cryptology ePrint Archive, Report 2004/180. 2004. Reference Source
  • 11. Boneh D, Boyen X: Short signatures without random oracles. In: Cachin C, Camenisch JL, editors, Advances in Cryptology - EUROCRYPT 2004. Berlin, Heidelberg: Springer Berlin Heidelberg;2004; pages56–73. 978-3-540-24676-3. [Google Scholar]
  • 12. Johnson D, Menezes A, Vanstone S: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. August 2001;1(1):36–63. . 10.1007/s102070100002 [DOI] [Google Scholar]
  • 13. National Institute of Standards and Technology: Digital signature standard (DSS). Technical Report Federal Information Processing Standards Publications (FIPS PUBS) 186-4, Change Notice 4 July 19, 2013, U.S. Washington, D.C.: Department of Commerce;2013. [Google Scholar]
  • 14. Hofheinz D, Jager T, Kiltz E: Short signatures from weaker assumptions. In: Lee Dong Hoon, Wang X, editors, Advances in Cryptology – ASIACRYPT. Berlin, Heidelberg: Springer Berlin Heidelberg;2011, pages647–666. 978-3-642-25385-0. [Google Scholar]
  • 15. Seo JH: Efficient digital signatures from rsa without random oracles. Info Sci. 2020;512:471–480. . 10.1016/j.ins.2019.09.084 Reference Source [DOI] [Google Scholar]
  • 16. Nyberg K, Rueppel Rainer A: Message recovery for signature schemes based on the discrete logarithm problem. In: De Santis A, editor, Advances in Cryptology — EUROCRYPT’94. Berlin, Heidelberg: Springer Berlin Heidelberg;1995; pages182–193. 978-3-540-44717-7. [Google Scholar]
  • 17. Miyaji A: A message recovery signature scheme equivalent to dsa over elliptic curves. 11 1996;1163. 10.1007/BFb0034830 [DOI] [Google Scholar]
  • 18. Bellare M, Rogaway P: The exact security of digital signatures-how to sign with rsa and rabin. In: Maurer U, editor, Advances in Cryptology — EUROCRYPT ’96. Berlin, Heidelberg: Springer Berlin Heidelberg;1996; pages399–416. 978-3-540-68339-1. [Google Scholar]
  • 19. Abe M, Okamoto T: A signature scheme with message recovery as secure as discrete logarithm. In: Lam Kwok-Yan, Okamoto E, Xing C, editors, Advances in Cryptology - ASIACRYPT’99. Berlin, Heidelberg: Springer Berlin Heidelberg;1999; pages378–389. 978-3-540-48000-6. [Google Scholar]
  • 20. Tzeng Shiang-Feng, Hwang Min-Shiang: Digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem. Computer Standards & Interfaces. 2004;26(2):61–71. . 10.1016/S0920-5489(03)00069-2 Reference Source [DOI] [Google Scholar]
  • 21. Sekhar MR: Signature scheme with message recovery and its application. Int J Computer Mathematics. 2004;81(3):285–289. 10.1080/00207160410001661294 [DOI] [Google Scholar]
  • 22. Tahat N, Shaqboua R, Abdallah E, et al. : A new digital signature scheme with message recovery using hybrid problems. Int J Electrical Computer Eng (IJECE). 10 2019;9:3576. 10.11591/ijece.v9i5.pp3576-3583 [DOI] [Google Scholar]
  • 23. Kazmirchuk S, Ilyenko A, Ilyenko S: Digital Signature Authentication Scheme with Message Recovery Based on the Use of Elliptic Curves. 01 2020; pages279–288. 978-3-030-16620-5. 10.1007/978-3-030-16621-2_26 [DOI] [Google Scholar]
  • 24. Goldwasser S, Micali S, Rivest Ronald L: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. April 1988;17(2):281–308. . 10.1137/0217017 [DOI] [Google Scholar]
  • 25. An JH, Dodis Y, Rabin T: On the security of joint signature and encryption. In: Knudsen LR, editor, Advances in Cryptology — EUROCRYPT 2002. Berlin, Heidelberg: Springer Berlin Heidelberg;2002; pages83–107. 978-3-540-46035-0. [Google Scholar]
  • 26. Fiat A, Shamir A: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko Andrew M, editor, Advances in Cryptology — CRYPTO’ 86. Berlin, Heidelberg: Springer Berlin Heidelberg;1987; pages186–194. 978-3-540-47721-1. [Google Scholar]
  • 27. Kurosawa K, Heng S-H: From digital signature to id-based identification/signature. In: Bao F, Deng R, Zhou J, editors, Public Key Cryptography – PKC 2004. Berlin, Heidelberg: Springer Berlin Heidelberg;2004; pages248–261. 978-3-540-24632-9. [Google Scholar]
  • 28. Katz J, Yung M: Scalable protocols for authenticated group key exchange. In: Boneh D, editor, Advances in Cryptology - CRYPTO 2003. Berlin, Heidelberg: Springer Berlin Heidelberg;2003; pages110–125. 978-3-540-45146-4. [Google Scholar]
  • 29. Canetti R, Halevi S, Katz J: Chosen-ciphertext security from identity-based encryption. In: Cachin C, Camenisch JL, editors, Advances in Cryptology - EUROCRYPT 2004. Berlin, Heidelberg: Springer Berlin Heidelberg;2004; pages207–222. 978-3-540-24676-3. [Google Scholar]
  • 30. Dolev D, Dwork C, Naor M: Non-malleable cryptography. SIAM J Computing. 03 1991;30. 10.1145/103418.103474 [DOI] [Google Scholar]
  • 31. Stern J, Pointcheval D, Malone-Lee J, et al. : Flaws in applying proof methodologies to signature schemes. In: Yung M, editor, Advances in Cryptology — CRYPTO 2002. Berlin, Heidelberg: Springer Berlin Heidelberg;2002; pages93–110. 978-3-540-45708-4. [Google Scholar]
  • 32. Bitcoin transaction malleability:2017. Reference SourceAccessed: 2021-06-03.
  • 33. Transaction malleability: Bitcoin Wiki [Online]. 2018. Accessed: 2021-06-03. Reference Source
  • 34. Decker C, Wattenhofer R: Bitcoin transaction malleability and mtgox. Lecture Notes in Computer Science. 2014; page313–326. . 10.1007/978-3-319-11212-1_18 [DOI] [Google Scholar]
  • 35. Diffie W, Van Oorschot PC, Wiener MJ: Authentication and authenticated key exchanges. Des. Codes Cryptography. June 1992;2(2):107–125. . 10.1007/BF00124891 [DOI] [Google Scholar]
  • 36. Jackson D, Cremers C, Cohn-Gordon K, et al. : Seems legit: Automated analysis of subtle attacks on protocols that use signatures. In Proc of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS ’19. New York, NY, USA: Association for Computing Machinery;2019; page2165–2180. 9781450367479. 10.1145/3319535.3339813 [DOI] [Google Scholar]
  • 37. Boneh D, Shen E, Waters B: Strongly unforgeable signatures based on computational diffie-hellman. In: Yung M, Dodis Y, Kiayias A, et al., editors, Public Key Cryptography - PKC 2006. Berlin, Heidelberg: Springer Berlin Heidelberg;2006; pages229–240. 978-3-540-33852-9. [Google Scholar]
  • 38. Brendel J, Cremers C, Jackson D, et al. : The provable security of ed25519: Theory and practice. 2021 2021 IEEE Symposium on Security and Privacy (SP). Los Alamitos, CA, USA: IEEE Computer Society;may 2021; pages715–732. 10.1109/SP40001.2021.00042 Reference Source [DOI] [Google Scholar]
  • 39. Micali S, Reyzin L: Improving the exact security of digital signature schemes. J. Cryptology. 03 2002;15:1–18. 10.1007/s00145-001-0005-8 [DOI] [Google Scholar]
  • 40. Goh Eu-Jin, Jarecki Stanisław: A signature scheme as secure as the diffie-hellman problem. In: Biham E, editor, Advances in Cryptology — EUROCRYPT 2003. Berlin, Heidelberg: Springer Berlin Heidelberg;2003; pages401–415. 978-3-540-39200-2. [Google Scholar]
  • 41. Bellare M, Shoup S: Two-tier signatures, strongly unforgeable signatures, and fiat-shamir without random oracles. In: Okamoto T, Wang X, editors, Public Key Cryptography – PKC 2007. Berlin, Heidelberg: Springer Berlin Heidelberg;2007; pages201–216. 978-3-540-71677-8. [Google Scholar]
  • 42. Brown D: On the Provable Security of ECDSA, page 21–40. London Mathematical Society Lecture Note Series: Cambridge University Press;2005. 10.1017/CBO9780511546570.004 [DOI] [Google Scholar]
  • 43. Fersch M, Kiltz E, Poettering B: On the provable security of (ec)dsa signatures. Proc 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16. New York, NY, USA: Association for Computing Machinery;2016; page1651–1662. 9781450341394. 10.1145/2976749.2978413 [DOI] [Google Scholar]
  • 44. Lamport L: Constructing digital signatures from a one way function. Technical Report CSL-98. October 1979. Reference SourceThis paper was published by IEEE in the Proceedings of HICSS-43 in January, 2010. [Google Scholar]
  • 45. Cramer R, Shoup V: Signature schemes based on the strong rsa assumption. Proc of the 6th ACM Conference on Computer and Communications Security, CCS ’99. New York, NY, USA: Association for Computing Machinery;1999; page46–51. 1581131488. 10.1145/319709.319716 [DOI] [Google Scholar]
  • 46. Boneh D, Mironov I, Shoup V: A secure signature scheme from bilinear maps. In: Joye M, editor, Topics in Cryptology — CT-RSA 2003. Berlin, Heidelberg: Springer Berlin Heidelberg;2003; pages98–110. 978-3-540-36563-1. [Google Scholar]
  • 47. Katz J, Wang N: Efficiency improvements for signature schemes with tight security reductions. Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS ’03. New York, NY, USA: Association for Computing Machinery;2003; page155–164. 1581137389. 10.1145/948109.948132 [DOI] [Google Scholar]
  • 48. Ateniese G, de Medeiros B: Efficient group signatures without trapdoors. In: Laih C-S, editor, Advances in Cryptology - ASIACRYPT 2003. Berlin, Heidelberg: Springer Berlin Heidelberg;2003; pages246–268. 978-3-540-40061-5. [Google Scholar]
  • 49. Ateniese G, Medeiros BD: A provably secure nyberg-rueppel signature variant with applications. IACR Cryptol. ePrint Arch. 2004:93,2004. [Google Scholar]
  • 50. Goh E-J, Jarecki S, Katz J, et al. : Efficient signature schemes with tight reductions to the diffie-hellman problems. J. Cryptol. 2007;20(4):493–514. 10.1007/s00145-007-0549-3 [DOI] [Google Scholar]
  • 51. Tantikittipisut W, Premasathian N: Strongly unforgeable signature scheme without one-time key. 2009 Eighth IEEE/ACIS Int Conf Computer Information Sci. 2009; pages313–316. 10.1109/ICIS.2009.205 [DOI] [Google Scholar]
  • 52. Abe M, Groth J, Haralambiev K, et al. : Optimal structure-preserving signatures in asymmetric bilinear groups. CRYPTO. 2011. 10.1007/978-3-642-22792-9_37 [DOI] [Google Scholar]
  • 53. Josefsson S, Liusvaara I: Edwards-Curve Digital Signature Algorithm (EdDSA). RFC 8032. January 2017. Reference Source [Google Scholar]
  • 54. Ng T-S, Tan S-Y, Chin J-J: Improving signature schemes with tight security reductions. In: Heng S-H, Lopez J: editors, Information Security Practice and Experience. Cham: Springer International Publishing;2019; pages273–292. ISBN 978-3-030-34339-2. [Google Scholar]
  • 55. Rondepierre F: Revisiting atomic patterns for scalar multiplications on elliptic curves. Cryptology ePrint Archive, Report 2015/408. 2015. Reference Source [Google Scholar]
  • 56. Teranishi I, Oyama T, Ogata W: General conversion for obtaining strongly existentially unforgeable signatures. In: Barua R, Lange T: editors, Progress in Cryptology - INDOCRYPT 2006. Berlin, Heidelberg: Springer Berlin Heidelberg;2006; pages191–205. 978-3-540-49769-1. [Google Scholar]
  • 57. Steinfeld R, Pieprzyk J, Wang H: How to strengthen any weakly unforgeable signature into a strongly unforgeable signature. In: Abe M: editor, Topics in Cryptology – CT-RSA 2007. Berlin, Heidelberg: Springer Berlin Heidelberg;2006; pages357–371. 978-3-540-69328-4. [Google Scholar]
  • 58. Huang Q, Wong DS, Zhao Y: Generic transformation to strongly unforgeable signatures. In: Katz J, Yung M: editors, Applied Cryptography and Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg;2007; pages1–17. 978-3-540-72738-5. [Google Scholar]
  • 59. Li J, Kim K, Zhang F, et al. : Generic security-amplifying methods of ordinary digital signatures. In: Bellovin SM, Gennaro R, Keromytis A, et al.: editors, Applied Cryptography and Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg;2008; pages224–241. 978-3-540-68914-0. [Google Scholar]
  • 60. Liu JK, Au MH, Susilo W, et al. : Short generic transformation to strongly unforgeable signature in the standard model. In: Gritzalis D, Preneel B, Theoharidou M: editors, Computer Security – ESORICS 2010. Berlin, Heidelberg: Springer Berlin Heidelberg;2010; pages168–181. 978-3-642-15497-3. [Google Scholar]
  • 61. Katz J, Vaikuntanathan V: Signature schemes with bounded leakage resilience. In: Matsui M: editor, Advances in Cryptology – ASIACRYPT 2009. Berlin, Heidelberg: Springer Berlin Heidelberg;2009; pages703–720. 978-3-642-10366-7. [Google Scholar]
  • 62. Wang Y, Tanaka K: Generic transformation to strongly existentially unforgeable signature schemes with leakage resiliency. In: Chow SSM, Liu JK, Hui LCK, et al.: editors, Provable Security. Cham: Springer International Publishing;2014; pages117–129. 978-3-319-12475-9. [Google Scholar]
  • 63. Wang Y, Tanaka K: Generic transformation to strongly existentially unforgeable signature schemes with continuous leakage resiliency. In: Foo E, Stebila D: editors, Information Security and Privacy. Cham: Springer International Publishing;2015; pages213–229. 978-3-319-19962-7. [Google Scholar]
  • 64. Huang J, Huang Q, Pan C: A black-box construction of strongly unforgeable signature schemes in the bounded leakage model. In: Chen L, Han J: editors, Provable Security. Cham: Springer International Publishing;2016; pages320–339. 978-3-319-47422-9. [Google Scholar]
  • 65. Goldreich O: The foundations of cryptography - volume 2: Basic applications. 2001.
  • 66. Groth J, Sahai A: Efficient non-interactive proof systems for bilinear groups. Cryptology ePrint Archive, Report 2007/155. 2007. Reference Source [Google Scholar]
  • 67. Moriarty K, Kaliski B, Jonsson J, et al. : PKCS #1: RSA Cryptography Specifications Version 2.2. RFC 8017. November 2016. Reference SourceSection 9.2, Note 2.
  • 68. Rückert M: Strongly unforgeable signatures and hierarchical identity-based signatures from lattices without random oracles. In: Sendrier N: editor, Post-Quantum Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg;2010; pages182–200. 978-3-642-12929-2. [Google Scholar]
  • 69. Noh G, Chun JY, Jeong IR: Strongly unforgeable ring signature scheme from lattices in the standard model. J Appl Mathematics, 2014. 2014. . 10.1155/2014/371924 [DOI] [Google Scholar]
  • 70. Eaton E, Song F: Making existential-unforgeable signatures strongly unforgeable in the quantum random-oracle model. arXiv preprint arXiv:1509.02944. 2015. [Google Scholar]
  • 71. Cremers C, Düzlü S, Fiedler R, et al. : Buffing signature schemes beyond unforgeability and the case of post-quantum signatures. Cryptology ePrint Archive, Report 2020/1525. 2020. Reference Source [Google Scholar]
  • 72. Wang F, Wang K, Bao L, et al. : Leveled strongly-unforgeable identity-based fully homomorphic signatures. In: López J, Mitchell CJ: editors, Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings volume 9290 of Lecture Notes in Computer Science. Springer;2015; pages42–60. 10.1007/978-3-319-23318-5\_3 [DOI] [Google Scholar]
  • 73. Park H, Lim S, Yie I, et al. : Strong unforgeability in group signature schemes. Computer Standards Interfaces. 2009;31(4):856–862. . 10.1016/j.csi.2008.09.019 Reference Source [DOI] [Google Scholar]
  • 74. Sun Y, Xu C, Yu Y, et al. : Strongly unforgeable proxy signature scheme secure in the standard model. J Syst Soft. 2011;84(9):1471–1479. . 10.1016/j.jss.2011.02.041 Reference SourceSelected papers from the 2009 Joint Working IEEE/IFIP Conference on Software Architecture & European Conference on Software Architecture (WICSA/ECSA 2009). [DOI] [Google Scholar]
  • 75. Yu Y, Yi M, Susilo W, et al. : Provably secure proxy signature scheme from factorization. Mathematical and Computer Modelling. 2012;55(3):1160–1168. . 10.1016/j.mcm.2011.09.040 Reference Source [DOI] [Google Scholar]
  • 76. Pang L, Zhao H, Zhou X, et al. : Strongly unforgeable and efficient proxy signature scheme with fast revocation secure in the standard model. Int J Distributed Sensor Networks. 2016;12(1):3205206. 10.1155/2016/3205206 [DOI] [Google Scholar]
  • 77. Sato C, Okamoto T, Okamoto E: Strongly unforgeable id-based signatures without random oracles. In: Bao F, Li H, Wang G: editors, Information Security Practice and Experience. Berlin, Heidelberg: Springer Berlin Heidelberg;2009: pages35–46. 978-3-642-00843-6. [Google Scholar]
  • 78. Zhang J, Liu X: An efficient strong id-based signature scheme with unforgeability. 2010 Fifth International Conference on Frontier of Computer Science and Technology. 2010; pages239–245. 10.1109/FCST.2010.26 [DOI] [Google Scholar]
  • 79. Yu Y, Yi M, Wang G, et al. : Improved certificateless signature scheme provably secure in the standard model. Information Security, IET. 06 2012;6:102–110. 10.1049/iet-ifs.2011.0004 [DOI] [Google Scholar]
  • 80. Liu Z, Zhang X, Hu Y, et al. : Revocable and strongly unforgeable identity-based signature scheme in the standard model. Sec. and Commun. Netw. September 2016;9(14):2422–2433. . 10.1002/sec.1513 [DOI] [Google Scholar]
F1000Res. 2023 Feb 13. doi: 10.5256/f1000research.76522.r162696

Reviewer response for version 1

Pin Shen Teh 1

  • The research objective was clear.

  • The concept of the work was straightforward.

  • The presentation style of the article was clear.

  • Grammar mistakes are noticeable. The sentence structure and choice of words used can be more concise and precise, some terms used were somewhat inconsistent, making reading and understanding the article quite challenging.

  • Further elaboration of why the three popular DSS that are not sEUF-CMA secure would be helpful.

  • Overall the depth of the work is sufficient for the calibre of this journal.

Is the review written in accessible language?

Yes

Are all factual statements correct and adequately supported by citations?

Yes

Are the conclusions drawn appropriate in the context of the current research literature?

Yes

Is the topic of the review discussed comprehensively in the context of the current literature?

Yes

Reviewer Expertise:

Biometrics, Security, Machine Learning, Mobile Authentication

I confirm that I have read this submission and believe that I have an appropriate level of expertise to confirm that it is of an acceptable scientific standard.

F1000Res. 2021 Nov 3. doi: 10.5256/f1000research.76522.r97082

Reviewer response for version 1

Denis Chee-Keong Wong 1

The paper performs a review on existing DSS together with its properties, such as public verifiability, non-repudiation, and ability for message recovering. Furthermore, a detailed discussion on DSS security models are included, which are the EUF-CMA and sEUF-CMA. The differences between both security models are elaborated upon in detail. Finally, the authors provided comprehensive information on existing DSS in Table 1 for comparison purposes. As a survey paper, this work is comprehensive and suitable to be indexed. The authors need to re-check some of the entries in Table 1 to ensure the information stated is correct - please look at the "GJK +07-1", and please ensure the group G used is the same for all schemes with |G| in the column of "sig. len.".

Is the review written in accessible language?

Yes

Are all factual statements correct and adequately supported by citations?

Yes

Are the conclusions drawn appropriate in the context of the current research literature?

Yes

Is the topic of the review discussed comprehensively in the context of the current literature?

Yes

Reviewer Expertise:

Algebraic cryptography, algebra

I confirm that I have read this submission and believe that I have an appropriate level of expertise to confirm that it is of an acceptable scientific standard.

Associated Data

    This section collects any data citations, data availability statements, or supplementary materials included in this article.

    Data Availability Statement

    No data is associated with this article.


    Articles from F1000Research are provided here courtesy of F1000 Research Ltd

    RESOURCES