CryptoDB
Mikhail Kudinov
Publications
Year
Venue
Title
2025
CRYPTO
At the Top of the Hypercube -- Better Size-Time Tradeoffs for Hash-Based Signatures
Abstract
Hash-based signatures have been studied for decades and have recently gained renewed attention due to their post-quantum security.
At the core of the most prominent hash-based signature schemes, XMSS and SPHINCS+,
lies a one-time signature scheme based on hash chains due to Winternitz.
In this scheme, messages are encoded into vectors of positions (i.e., vertices in a hypercube) in the hash chains, and the signature contains the respective chain elements.
The encoding process is crucial for the efficiency and security of this construction.
In particular, it determines a tradeoff between signature size and computational costs.
Researchers have been trying to improve this size-time tradeoff curve for decades, but all improvements have been arguably marginal.
In this work, we revisit the encoding process with the goal of minimizing verification costs and signature sizes. As our first result, we present a novel lower bound for the verification cost given a fixed signature size.
Our lower bound is the first to directly apply to general encodings including randomized, non-uniform, and non-injective ones.
Then, we present new encodings and prove their security. Inspired by our lower bound, these encodings follow a counterintuitive approach: we map messages non-uniformly into the top layers of a much bigger hypercube than needed but the encoding itself has (hard to find) collisions.
With this, we get a 20% to 40% improvement in the verification cost of the signature while keeping the same security level and the same size.
Our constructions can be directly plugged into any signature scheme based on hash chains, which includes SPHINCS+ and XMSS.
2022
ASIACRYPT
Recovering the tight security proof of SPHINCS+
📺
Abstract
In 2020, Kudinov, Kiktenko, and Fedorov pointed out a flaw in the tight security proof of the SPHINCS+ construction. This work gives a new tight security proof for SPHINCS+. The flaw can be traced back to the security proof for the Winternitz one-time signature scheme (WOTS) used within SPHINCS+. In this work, we give a stand-alone description of the WOTS variant used in SPHINCS+ that we call WOTS-TW. We provide a security proof for WOTS-TW and multi-instance WOTS-TW against non-adaptive chosen message attacks where the adversary only learns the public key after it made its signature query. Afterwards, we show that this is sufficient to give a tight security proof for SPHINCS+. We recover almost the same bound for the security of SPHINCS+, with only a factor w loss compared to the previously claimed bound, where w is the Winternitz parameter that is commonly set to 16. On a more technical level, we introduce new lower bounds on the quantum query complexity for generic attacks against properties of cryptographic hash functions and analyse the constructions of tweakable hash functions used in SPHINCS+ with regard to further security properties.
Coauthors
- Andreas Hülsing (1)
- Dmitry Khovratovich (1)
- Mikhail Kudinov (2)
- Benedikt Wagner (1)