Abstract | ||
---|---|---|
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Our model of subversion generalizes previous work in several directions, and is inspired by the proliferation of software attacks (e.g., malware and buffer overflow attacks), and by the recent revelations of Edward Snowden about intelligence agencies trying to surreptitiously sabotage cryptographic algorithms. The main security requirement we put forward demands that a signature scheme should remain unforgeable even in the presence of an attacker applying SAs (within a certain class of allowed attacks) in a fully-adaptive and continuous fashion. Previous notions—e.g., the notion of security against algorithm-substitution attacks introduced by Bellare et al. (CRYPTO ‘14) for symmetric encryption—were non-adaptive and non-continuous. |
Year | DOI | Venue |
---|---|---|
2020 | 10.1016/j.tcs.2020.03.021 | Theoretical Computer Science |
Keywords | DocType | Volume |
Algorithm-substitution attacks,Subversion,Digital signatures | Journal | 820 |
ISSN | Citations | PageRank |
0304-3975 | 1 | 0.40 |
References | Authors | |
74 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Giuseppe Ateniese | 1 | 4380 | 254.66 |
Bernardo Magri | 2 | 41 | 8.32 |
Daniele Venturi | 3 | 210 | 26.43 |