Hash-based cryptography

From HandWiki

Hash-based cryptography is the generic term for constructions of cryptographic primitives based on the security of hash functions. It is of interest as a type of post-quantum cryptography. So far, hash-based cryptography is used to construct digital signatures schemes such as the Merkle signature scheme, zero knowledge and computationally integrity proofs, such as the zk-STARK[1] proof system and range proofs over issued credentials via the HashWires[2] protocol. Hash-based signature schemes combine a one-time signature scheme, such as a Lamport signature, with a Merkle tree structure. Since a one-time signature scheme key can only sign a single message securely, it is practical to combine many such keys within a single, larger structure. A Merkle tree structure is used to this end. In this hierarchical data structure, a hash function and concatenation are used repeatedly to compute tree nodes.

One consideration with hash-based signature schemes is that they can only sign a limited number of messages securely, because of their use of one-time signature schemes. The US National Institute of Standards and Technology (NIST), specified that algorithms in its post-quantum cryptography competition support a minimum of 2Template:Superscript signatures safely.[3]

In 2022, NIST announced SPHINCS+ as one of three algorithms to be standardized for digital signatures.[4] NIST standardized stateful hash-based cryptography based on the eXtended Merkle Signature Scheme (XMSS) and Leighton–Micali Signatures (LMS), which are applicable in different circumstances, in 2020, but noted that the requirement to maintain state when using them makes them more difficult to implement in a way that avoids misuse.[5][6][7]

History

Leslie Lamport invented hash-based signatures in 1979. The XMSS (eXtended Merkle Signature Scheme)[8] and SPHINCS[9][10] hash-based signature schemes were introduced in 2011 and 2015, respectively. XMSS was developed by a team of researchers under the direction of Johannes Buchmann and is based both on Merkle's seminal scheme and on the 2007 Generalized Merkle Signature Scheme (GMSS).[11] A multi-tree variant of XMSS, XMSSMT, was described in 2013.[12]

One-time signature schemes

Hash-based signature schemes use one-time signature schemes as their building block. A given one-time signing key can only be used to sign a single message securely. Indeed, signatures reveal part of the signing key. The security of (hash-based) one-time signature schemes relies exclusively on the security of an underlying hash function.

Commonly used one-time signature schemes include the Lamport–Diffie scheme, the Winternitz scheme[13] and its improvements, such as the W-OTS+ scheme.[14] Unlike the seminal Lamport–Diffie scheme, the Winternitz scheme and variants can sign many bits at once. The number of bits to be signed at once is determined by a value: the Winternitz parameter. The existence of this parameter provides a trade-off between size and speed. Large values of the Winternitz parameter yield short signatures and keys, at the price of slower signing and verifying. In practice, a typical value for this parameter is 16.

In the case of stateless hash-based signatures, few-time signature schemes are used. Such schemes allow security to decrease gradually in case a few-time key is used more than once. HORST is an example of a few-time signature scheme.

Combining many one-time key pairs into a hash-based signature scheme

The central idea of hash-based signature schemes is to combine a larger number of one-time key pairs into a single structure to obtain a practical way of signing more than once (yet a limited number of times). This is done using a Merkle tree structure, with possible variations. One public and one private key are constructed from the numerous public and private keys of the underlying one-time scheme. The global public key is the single node at the very top of the Merkle tree. Its value is an output of the selected hash function, so a typical public key size is 32 bytes. The validity of this global public key is related to the validity of a given one-time public key using a sequence of tree nodes. This sequence is called the authentication path. It is stored as part of the signature, and allows a verifier to reconstruct the node path between those two public keys.

The global private key is generally handled using a pseudo-random number generator. It is then sufficient to store a seed value. One-time secret keys are derived successively from the seed value using the generator. With this approach, the global private key is also very small, e.g. typically 32 bytes.

The problem of tree traversal is critical to signing performance. Increasingly efficient approaches have been introduced, dramatically speeding up signing time.

Some hash-based signature schemes use multiple layers of tree, offering faster signing at the price of larger signatures. In such schemes, only the lowest layer of trees is used to sign messages, while all other trees sign root values of lower trees.

The Naor–Yung work[15] shows the pattern by which to transfer a limited time signature of the Merkle type family into an unlimited (regular) signature scheme.

Properties of hash-based signature schemes

Hash-based signature schemes rely on security assumptions about the underlying hash function, but any hash function fulfilling these assumptions can be used. As a consequence, each adequate hash function yields a different corresponding hash-based signature scheme. Even if a given hash function becomes insecure, it is sufficient to replace it by a different, secure one to obtain a secure instantiation of the hash-based signature scheme under consideration. Some hash-based signature schemes (such as XMSS with pseudorandom key generation) are forward secure, meaning that previous signatures remain valid if a secret key is compromised.

The minimality of security assumptions is another characteristic of hash-based signature schemes. Generally, these schemes only require a secure (for instance in the sense of second preimage resistance) cryptographic hash function to guarantee the overall security of the scheme. This kind of assumption is necessary for any digital signature scheme; however, other signature schemes require additional security assumptions, which is not the case here.

Because of their reliance on an underlying one-time signature scheme, hash-based signature schemes can only sign a fixed number of messages securely. In the case of the Merkle and XMSS schemes, a maximum of [math]\displaystyle{ 2^h }[/math] messages can be signed securely, with [math]\displaystyle{ h }[/math] the total Merkle tree height.

Examples of hash-based signature schemes

Since Merkle's initial scheme, numerous hash-based signature schemes with performance improvements have been introduced. Recent ones include the XMSS, the Leighton–Micali (LMS), the SPHINCS and the BPQS schemes. Most hash-based signature schemes are stateful, meaning that signing requires updating the secret key, unlike conventional digital signature schemes. For stateful hash-based signature schemes, signing requires keeping state of the used one-time keys and making sure they are never reused. The XMSS, LMS and BPQS[16] schemes are stateful, while the SPHINCS scheme is stateless. SPHINCS signatures are larger than XMSS and LMS signatures. BPQS has been designed specifically for blockchain systems. Additionally to the WOTS+ one-time signature scheme,[14] SPHINCS also uses a few-time (hash-based) signature scheme called HORST. HORST is an improvement of an older few-time signature scheme, HORS (Hash to Obtain Random Subset).[17]

The stateful hash-based schemes XMSS and XMSSMT are specified in RFC 8391 (XMSS: eXtended Merkle Signature Scheme).[18] Leighton–Micali Hash-Based Signatures are specified in RFC 8554.[19] Practical improvements have been proposed in the literature that alleviate the concerns introduced by stateful schemes.[20] Hash functions appropriate for these schemes include SHA-2, SHA-3 and BLAKE.

Implementations

The XMSS, GMSS and SPHINCS schemes are available in the Java Bouncy Castle cryptographic APIs.[21] SPHINCS is implemented in the SUPERCOP benchmarking toolkit.[22] Optimised[23] and unoptimised[24] reference implementations of the XMSS RFC exist. The LMS scheme has been implemented in Python[25] and in C[26] following its Internet-Draft.

References

  1. Ben-Sasson, Eli and Bentov, Iddo and Horesh, Yinon and Riabzev, Michael, 2018. Scalable, transparent, and post-quantum secure computational integrity.
  2. Chalkias, Konstantinos; Cohen, Shir; Lewi, Kevin; Moezinia, Fredric; Romailler, Yolan (2021). "HashWires: Hyperefficient Credential-Based Range Proofs". Privacy Enhancing Technologies Symposium (PETS) 2021. https://eprint.iacr.org/2021/297. 
  3. "Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process". https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/call-for-proposals-final-dec-2016.pdf. 
  4. "NIST announces four quantum-resistant algorithms" (in en-US). 2022-07-05. https://venturebeat.com/2022/07/05/nist-post-quantum-cryptography-standard/. 
  5. Computer Security Division, Information Technology Laboratory (2019-02-01). "Request for Public Comments on Stateful HBS | CSRC" (in EN-US). https://csrc.nist.gov/news/2019/stateful-hbs-request-for-public-comments. 
  6. Alagic, Gorjan; Apon, Daniel; Cooper, David; Dang, Quynh; Dang, Thinh; Kelsey, John; Lichtinger, Jacob; Miller, Carl et al. (2022-07-05) (in en). Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process. doi:10.6028/NIST.IR.8413-upd1. https://csrc.nist.gov/publications/detail/nistir/8413/final. 
  7. Cooper, David; Apon, Daniel; Dang, Quynh; Davidson, Michael; Dworkin, Morris; Miller, Carl (2020-10-29) (in en). Recommendation for Stateful Hash-Based Signature Schemes. doi:10.6028/NIST.SP.800-208. https://csrc.nist.gov/publications/detail/sp/800-208/final. 
  8. Buchmann, Johannes; Dahmen, Erik; Hülsing, Andreas (2011). "XMSS – A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions". Post-Quantum Cryptography. Lecture Notes in Computer Science. 7071. pp. 117–129. doi:10.1007/978-3-642-25405-5_8. ISBN 978-3-642-25404-8. 
  9. Bernstein, Daniel J.; Hopwood, Daira; Hülsing, Andreas; Lange, Tanja; Niederhagen, Ruben; Papachristodoulou, Louiza; Schneider, Michael; Schwabe, Peter et al. (2015). "SPHINCS: Practical Stateless Hash-Based Signatures". in Oswald, Elisabeth (in en). Advances in Cryptology -- EUROCRYPT 2015. Lecture Notes in Computer Science. 9056. Springer Berlin Heidelberg. pp. 368–397. doi:10.1007/978-3-662-46800-5_15. ISBN 9783662467992. 
  10. "SPHINCS: Introduction". http://sphincs.cr.yp.to/. 
  11. Buchmann, Johannes; Dahmen, Erik; Klintsevich, Elena; Okeya, Katsuyuki; Vuillaume, Camille (2007). "Merkle Signatures with Virtually Unlimited Signature Capacity" (in en). Applied Cryptography and Network Security. Lecture Notes in Computer Science. 4521. pp. 31–45. doi:10.1007/978-3-540-72738-5_3. ISBN 978-3-540-72737-8. 
  12. Hülsing, Andreas; Rausch, Lea; Buchmann, Johannes (2013). "Optimal Parameters for XMSS MT" (in en). Security Engineering and Intelligence Informatics. Lecture Notes in Computer Science. 8128. pp. 194–208. doi:10.1007/978-3-642-40588-4_14. ISBN 978-3-642-40587-7. 
  13. Dods, C.; Smart, N. P.; Stam, M. (2005). "Hash Based Digital Signature Schemes" (in en). Cryptography and Coding. Lecture Notes in Computer Science. 3796. pp. 96–115. doi:10.1007/11586821_8. ISBN 978-3-540-30276-6. 
  14. 14.0 14.1 Hülsing, Andreas (2013). "W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes". Progress in Cryptology – AFRICACRYPT 2013. Lecture Notes in Computer Science. 7918. pp. 173–188. doi:10.1007/978-3-642-38553-7_10. ISBN 978-3-642-38552-0. 
  15. M. Naor, M. Yung. "Universal One-Way Hash Functions and their Cryptographic Applications". STOC 1989. [1].
  16. Chalkias, Konstantinos; Brown, James; Hearn, Mike; Lillehagen, Tommy; Nitto, Igor; Schroeter, Thomas (2018). "Blockchained Post-Quantum Signatures". Proceedings of the IEEE International Conference on Blockchain (Cybermatics-2018): 1196–1203. https://eprint.iacr.org/2018/658.pdf. 
  17. Reyzin, Leonid; Reyzin, Natan (2002). "Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying" (in en). Information Security and Privacy. Lecture Notes in Computer Science. 2384. pp. 144–153. doi:10.1007/3-540-45450-0_11. ISBN 978-3-540-43861-8. 
  18. Hülsing, Andreas; Butin, Denis; Gazdag, Stefan; Rijneveld, Joost; Mohaisen, Aziz (May 2018) (in en). RFC 8391 – XMSS: eXtended Merkle Signature Scheme. IETF. https://tools.ietf.org/html/rfc8391. 
  19. McGrew, David; Curcio, Michael; Fluhrer, Scott (April 2019) (in en). RFC 8554 – Leighton–Micali Hash-Based Signatures. IETF. https://tools.ietf.org/html/rfc8554. 
  20. McGrew, David; Kampanakis, Panos; Fluhrer, Scott; Gazdag, Stefan-Lukas; Butin, Denis; Buchmann, Johannes (2016). "State Management for Hash-Based Signatures" (in en). Security Standardisation Research. Lecture Notes in Computer Science. 10074. pp. 244–260. doi:10.1007/978-3-319-49100-4_11. ISBN 978-3-319-49099-1. https://pdfs.semanticscholar.org/502a/2a2f5043f0d32fec0a5818d203fb4c9cd266.pdf. 
  21. "bcgit/bc-java" (in en). 2018-12-18. https://github.com/bcgit/bc-java/tree/master/core/src/main/java/org/bouncycastle/pqc/crypto. 
  22. "SUPERCOP". http://bench.cr.yp.to/supercop.html. 
  23. "Code". https://huelsing.wordpress.com/code/. 
  24. "squareUP > Publications" (in en-gb). http://www.pqsignatures.org/index/publications.html#code. 
  25. David, McGrew (2018-05-29). "The hash-sigs package: an implementation of the Leighton–Micali Hierarchical Signature System (HSS)." (in en). https://github.com/davidmcgrew/hash-sigs/. 
  26. David, McGrew (2018-11-22). "A full-featured implementation of the LMS and HSS Hash Based Signature Schemes from draft-mcgrew-hash-sigs-07." (in en). https://github.com/cisco/hash-sigs. 
  • T. Lange. "Hash-Based Signatures". Encyclopedia of Cryptography and Security, Springer U.S., 2011. [2]
  • F. T. Leighton, S. Micali. "Large provably fast and secure digital signature schemes based one secure hash functions". US Patent 5,432,852, [3] 1995.
  • G. Becker. "Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis", seminar 'Post Quantum Cryptology' at the Ruhr-University Bochum, Germany, 2008. [4]
  • E. Dahmen, M. Dring, E. Klintsevich, J. Buchmann, L. C. Coronado Garcia. "CMSS — An Improved Merkle Signature Scheme". Progress in Cryptology – Indocrypt 2006. [5]
  • R. Merkle. "Secrecy, authentication and public key systems / A certified digital signature". Ph.D. dissertation, Dept. of Electrical Engineering, Stanford University, 1979. [6]
  • S. Micali, M. Jakobsson, T. Leighton, M. Szydlo. "Fractal Merkle Tree Representation and Traversal". RSA-CT 03. [7]
  • P. Kampanakis, S. Fluhrer. "LMS vs XMSS: A comparison of the Stateful Hash-Based Signature Proposed Standards". Cryptology ePrint Archive, Report 2017/349. [8]
  • D. Naor, A. Shenhav, A. Wool. "One-Time Signatures Revisited: Practical Fast Signatures Using Fractal Merkle Tree Traversal". IEEE 24th Convention of Electrical and Electronics Engineers in Israel, 2006. [9]

External links

  • [10] A commented list of literature about hash-based signature schemes.
  • [11] Another list of references (uncommented).