Bounded pre-image awareness and the security of hash-tree keyless signatures

4Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present a new tighter security proof for unbounded hash tree keyless signature (time-stamping) schemes that useMerkle-Damg˚ard (MD) hash functions with Preimage Aware (PrA) compression functions. It is known that the PrA assumption alone is insufficient for proving the security of unbounded hash tree schemes against back-dating attacks. We show that many known PrA constructions satisfy a stronger Bounded Pre-Image Awareness (BPrA) condition that assumes the existence of an extractor E that is bounded in the sense that for any efficiently computable query string α, the number of outputs y for which E(y, α) succeeds does not exceed the number of queries in α.We show that blockcipher based MD-hash functions with rate-1 compression functions (such as Davies-Meyer and Miyaguchi-Preneel) of both type I and type II are BPrA. We also show that the compression function of Shrimpton-Stam that uses non-compressing components is BPrA. The security proof for unbounded hash-tree schemes is very tight under the BPrA assumption. In order to have 2s-security against back-dating, the hash function must have n = 2s + 4 output bits, assuming that the security of the hash function is close to the birthday barrier, i.e. that there are no structural weaknesses in the hash function itself. Note that the previous proofs that assume PrA gave the estimation n = 2s + 2log2 C + 2, where C is the maximum allowed size of the hash tree. For example, if s = 100 (2100- security) and C = 260, the previous proofs require n = 322 output bits, while the new proof requires n = 204 output bits.

Cite

CITATION STYLE

APA

Buldas, A., Laanoja, R., Laud, P., & Truu, A. (2014). Bounded pre-image awareness and the security of hash-tree keyless signatures. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8782, 130–145. https://doi.org/10.1007/978-3-319-12475-9_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free