CryptoDB
Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers?
Authors: |
|
---|---|
Download: | |
Abstract: | The adversary model of white-box cryptography includes an extreme case where the adversary, sitting at the endpoint, has full access to a cryptographic scheme. Motivating by the fact that most existing white-box implementations focus on symmetric encryption, we present implementations for hash-based signatures so that the security against white-box attackers (who have read-only access to data with a size bounded by a space-hardness parameter M) depends on the availability of a white-box secure cipher (in addition to a general one-way function). We also introduce parameters and key-generation complexity results for white-box secure instantiation of stateless hash-based signature scheme SPHINCS+, one of the NIST selections for quantum-resistant digital signature algorithms, and its older version SPHINCS. We also present a hash tree-based solution for one-time passwords secure in a white-box attacker context. We implement the proposed solutions and share our performance results. |
BibTeX
@article{cic-2024-34398, title={Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers?}, journal={cic}, publisher={International Association for Cryptologic Research}, volume={1, Issue 2}, url={https://cic.iacr.org//p/1/2/5}, doi={10.62056/an59qgxq}, author={Kemal Bicakci and Kemal Ulker and Yusuf Uzunay and Halis Taha Şahin and Muhammed Said Gündoğan}, year=2024 }