Paper 2020/1184
Constant-time verification for cut-and-choose-based signatures
Robert Ransom
Abstract
In most post-quantum signature protocols, the verification procedure leaks information about which signature is being verified, and/or which public key is being used to verify the signature, to timing and other side-channel attacks. In some applications, this information leak is a breach of user privacy or system security.
One class of signature protocols, based on the parallel composition of many runs of one or more interactive cut-and-choose protocols, can be modified to enable constant-time verification at low cost by fixing the multiset of challenges which will be chosen at the cut-and-choose step and randomizing only their order based on the hash of the input message. As a side benefit, this technique naturally makes the size and structure of signatures a fixed system parameter, even if the underlying cut-and-choose protocol has different response sizes for each possible challenge at the cut-and-choose step.
When applied to a 5-pass “
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. will be sent to NIST pqc-forum mailing list
- Keywords
- digital signatures
- Contact author(s)
- rransom 8774 @ gmail com
- History
- 2020-09-30: received
- Short URL
- https://ia.cr/2020/1184
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2020/1184, author = {Robert Ransom}, title = {Constant-time verification for cut-and-choose-based signatures}, howpublished = {Cryptology {ePrint} Archive, Paper 2020/1184}, year = {2020}, url = {https://eprint.iacr.org/2020/1184} }