Abstract
Studies of subversion attack against cryptosystem could be dated to several decades ago, while the Snowden revelation in 2013 has set off a new wave of exploring possible approaches to protect or subvert cryptography primitives in practice. Inspired by kleptographic attacks proposed by Young et al. [Crypto’96], we present the asymmetric subversion attack on signature and identification schemes in this work. Our contributions is summarized as follows:
-
We present the asymmetric subversion model for signature and identification schemes. The properties of our model are stronger than that of existing subversion model proposed by Giuseppe et al. [CCS’15] and show higher requirement in attack goal.
-
We propose the notion of splittable signature scheme and give a universal asymmetric subversion attack on such schemes. Our attack is independent of secret key size and more efficient than symmetric attacks introduced by Giuseppe et al. [CCS’15].
-
We introduce the asymmetric subversion attack on a special type of identification schemes and show that it can be transformed from splittable signature scheme.
Our subversion attack is demonstrated to be practical and could be mounted on many common schemes, which shows the danger of subversion attacks and spurs the exploring of effective deterrents.
Similar content being viewed by others
References
Liu C, Chen R, Wang Y et al (2018) Asymmetric subversion attacks on signature schemes. In: ACISP, pp 376–395
Ball J, Borger J, Greenwald G et al (2013) Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian 6:2–8
Perlroth N, Larson J, Shane S (2013) NSA able to foil basic safeguards of privacy on web. NY Times 5:1–8
Greenwald G (2014) No place to hide: Edward Snowden, the NSA, and the US surveillance state. Macmillan, London
Simmons GJ (1982) Message authentication without secrecy. In: AAAS selected symposia series, vol 69, pp 105–139
Simmons GJ (1983) Verification of treaty compliance–revisited. In: 1983 IEEE symposium on security and privacy. IEEE, p 61
Simmons GJ (1984) The subliminal channel and digital signatures. In: Workshop on the theory and application of of cryptographic techniques. Springer, pp 364–378
Young A, Yung M (1997) Kleptography: using cryptography against cryptography. In: EUROCRYPT, vol 97. Springer, pp 62–74
Young A, Yung M (1996) The dark side of “black-box” cryptography or: should we trust capstone?. In: CRYPTO, Springer, pp 89–103
Young A, Yung M (1997) The prevalence of kleptographic attacks on discrete-log based cryptosystems. In: CRYPTO, Springer, pp 264–276
Bellare M, Paterson KG, Rogaway P (2014) Security of symmetric encryption against mass surveillance. In: CRYPTO, pp 1–19
Bellare M, Jaeger J, Kane D (2015) Mass-surveillance without the state: strongly undetectable algorithm-substitution attacks. In: ACM CCS, ACM, pp 1431–1440
Ateniese G, Magri B, Venturi D (2015) Subversion-resilient signature schemes. In: ACM CCS, ACM, pp 364–375
Schnorr CP (1989) Efficient identification and signatures for smart cards. In: CRYPTO, pp 239–252
Boneh D (2011) Digital signature standard. In: Encyclopedia of cryptography and security, 2nd edn. p 347
Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton
ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theor 31(4):469–472
Waters B (2005) Efficient identity-based encryption without random oracles. In: EUROCRYPT, vol 3494. Springer, pp 114–127
Paterson KG (2002) ID-based signatures from pairings on elliptic curves. Electron Lett 38(18):1025–1026
Zhang F, Kim K (2002) ID-based blind signature and ring signature from pairings. In: ASIACRYPT, pp 629–637
Kurosawa K, Heng SH (2004) From digital signature to ID-based identification/signature. In: PKC, pp 248–261
Mironov I, Stephens-Davidowitz N (2015) Cryptographic reverse firewalls. In: EUROCRYPT, Springer, pp 657–686
Fischlin M, Mazaheri S (2017) Self-guarding cryptographic protocols against algorithm substitution attacks. IACR Cryptology ePrint Archive 2017:984
Russell A, Tang Q, Yung M, Zhou H (2016) Cliptography: clipping the power of kleptographic attacks. In: ASIACRYPT, Part II, pp 34–64
Dodis Y, Mironov I, Stephens-Davidowitz N (2016) Message transmission with reverse firewalls - secure communication on corrupted machines. In: CRYPTO, Part II, pp 341–372
Chen R, Mu Y, Yang G, Susilo W, Guo F, Zhang M (2016) Cryptographic reverse firewall via malleable smooth projective hash functions. In: ASIACRYPT, Part I, pp 844–876
Hofheinz D, Jager T, Knapp E (2012) Waters signatures with optimal security reduction. In: PKC, pp 66–83
Russell A, Tang Q, Yung M, Zhou H (2016) Destroying steganography via amalgamation: kleptographically CPA secure public key encryption. IACR Cryptology ePrint Archive 2016 :530
Russell A, Tang Q, Yung M, Zhou H (2017) Generic semantic security against a kleptographic adversary. In: ACM CCS, pp 907–922
Funding
This work is supported by the National Natural Science Foundation of China (Grant No. 61702541, No.61872087), the Young Elite Scientists Sponsorship Program by CAST (Grant No. 2017QNRC001), and the Science Research Plan Program by NUDT (Grant No, ZK17-03-46).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
A preliminary version of this paper appears in the proceedings of ACISP 2018 [1].
Rights and permissions
About this article
Cite this article
Wang, Y., Chen, R., Liu, C. et al. Asymmetric subversion attacks on signature and identification schemes. Pers Ubiquit Comput 26, 849–862 (2022). https://doi.org/10.1007/s00779-018-01193-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-018-01193-x