Skip to main content

Hide-and-Seek and the Non-resignability of the BUFF Transform

  • Conference paper
  • First Online:
Theory of Cryptography (TCC 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 15366))

Included in the following conference series:

  • 179 Accesses

Abstract

The BUFF transform, due to Cremers et al. (S&P’21), is a generic transformation for digital signature scheme, with the purpose of obtaining additional security guarantees beyond unforgeability: exclusive ownership, message-bound signatures, and non-resignability. Non-resignability (which essentially challenges an adversary to re-sign an unknown message for which it only obtains the signature) turned out to be a delicate matter, as recently Don et al. (CRYPTO’24) showed that the initial definition is essentially unachievable; in particular, it is not achieved by the BUFF transform. This led to the introduction of new, weakened versions of non-resignability, which are (potentially) achievable. In particular, it was shown that a salted variant of the BUFF transform does achieves some weakened version of non-resignability. However, the salting requires additional randomness and leads to slightly larger signatures. Whether the original BUFF transform also achieves some meaningful notion of non-resignability remained a natural open question.

In this work, we answer this question in the affirmative. We show that the BUFF transform satisfies the (almost) strongest notions of non-resignability one can hope for, facing the known impossibility results. Our results cover both the statistical and the computational case, and both the classical and the quantum setting. At the core of our analysis lies a new security game for random oracles that we call Hide-and-Seek. While seemingly innocent at first glance, it turns out to be surprisingly challenging to rigorously analyze.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    There are hypothetical signature schemes to which the attack from [13] does not apply, though we are not aware of any natural scheme for which that is the case.

  2. 2.

    We note that the statistic and the computational variants of \(\textsf{NR}^{H,\bot }\) are incomparable: in the computational case, the adversary is restricted in its computational power but is bound to a weaker entropy condition.

  3. 3.

    Here and in the remainder, we borrow from set notation to indicate the input and output space of (oracle) algorithms. In case of an algorithm that takes no input, we write the singleton set \(\{\bot \}\) as domain.

  4. 4.

    The hint function may be randomized, but we refer to it as a function for convenience.

  5. 5.

    For the purpose of proving Theorem 1, it would be sufficient to restrict the seeker \( \mathcal{D} \) to be query bounded as well; however, interestingly, we need the result for a query unbounded \( \mathcal{D} \) for the computational case (see Sect. 5 and Remark 5).

References

  1. Ambainis, A., Hamburg, M., Unruh, D.: Quantum security proofs using semi-classical oracles. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11693, pp. 269–295. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-26951-7_10

    Chapter  Google Scholar 

  2. Aulbach, T., Düzlü, S., Meyer, M., Struck, P., Weishäupl, M.: Hash your keys before signing: BUFF security of the additional NIST PQC signatures. In: Saarinen, M.J., Smith-Tone, D. (eds.) PQCrypto 2024. LNCS, vol. 14772, pp. 301–335. Springer, Cham (2024). https://doi.org/10.1007/978-3-031-62746-0_13

    Chapter  Google Scholar 

  3. Ayer, A.: Duplicate signature key selection attack in let’s encrypt. https://www.agwa.name/blog/post/duplicate_signature_key_selection_attack_in_lets_encrypt (2015)

  4. Baecher, P., Fischlin, M., Schröder, D.: Expedient non-malleability notions for hash functions. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 268–283. Springer, Heidelberg (2011)

    Google Scholar 

  5. Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Denning, D.E., Pyle, R., Ganesan, R., Sandhu, R.S., Ashby, V. (eds.) ACM CCS 93, pp. 62–73. ACM Press (1993)

    Google Scholar 

  6. Blake-Wilson, S., Menezes, A.: Unknown key-share attacks on the station-to-station (STS) protocol. In: Imai, H., Zheng, Y. (eds.) PKC’99. LNCS, vol. 1560, pp. 154–170. Springer, Heidelberg (1999)

    Google Scholar 

  7. Boneh, D., Dagdelen, Ö., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 41–69. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25385-0_3

    Chapter  Google Scholar 

  8. Chung, K.-M., Guo, S., Liu, Q., Qian, L.: Tight quantum time-space tradeoffs for function inversion. In: 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS), pp. 673–684 (2020)

    Google Scholar 

  9. Coretti, S., Dodis, Y., Guo, S., Steinberger, J.: Random oracles and non-uniformity. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10820, pp. 227–258. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78381-9_9

    Chapter  Google Scholar 

  10. Cremers, C., Düzlü, S., Fiedler, R., Fischlin, M., Janson, C.: BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. In: 2021 IEEE Symposium on Security and Privacy, pp. 1696–1714. IEEE Computer Society Press (2021). Cryptology ePrint Archive version https://eprint.iacr.org/archive/2020/1525/20230116:141028 (Version 1.3)

  11. Cremers, C., Düzlü, S., Fiedler, R., Fischlin, M., Janson, C.: BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures, 2023. An updated version (Version 1.4.1) of [10], https://eprint.iacr.org/archive/2020/1525/20231023:114351

  12. Dodis, Y., Guo, S., Katz, J.: Fixing cracks in the concrete: random oracles with auxiliary input, revisited. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 473–495. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56614-6_16

    Chapter  Google Scholar 

  13. Don, J., Fehr, S., Huang, Y.-H., Struck, P.: On the (in)security of the BUFF transform. In: Reyzin, L., Stebila, D. (eds.) CRYPTO 2024. LNCS, vol. 14920, pp. 246–275. Springer, Cham (2024). https://doi.org/10.1007/978-3-031-68376-3_8

    Chapter  Google Scholar 

  14. Düzlü, S., Fiedler, R., Fischlin, M.: BUFFing FALCON without increasing the signature size. In: SAC 2024. LNCS (2024, to appear). Cryptology ePrint Archive version available at https://eprint.iacr.org/2024/710

  15. Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM J. Comput. 28(4), 1364–1396 (1999)

    Article  MathSciNet  Google Scholar 

  16. Hsiao, C.-Y., Lu, C.-J., Reyzin, L.: Conditional computational entropy, or toward separating pseudoentropy from compressibility. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 169–186. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72540-4_10

    Chapter  Google Scholar 

  17. Jackson, D., Cremers, C., Cohn-Gordon, K., Sasse, R.: Seems legit: automated analysis of subtle attacks on protocols that use signatures. In: Cavallaro, L., Kinder, J., Wang, X., Katz, J. (eds.) ACM CCS 2019, pp. 2165–2180. ACM Press (2019)

    Google Scholar 

  18. Kim, T.H.-J., Basescu, C., Jia, L., Lee, S.B., Hu, Y.-C., Perrig, A.: Lightweight source authentication and path validation. In: Proceedings of the 2014 ACM Conference on SIGCOMM, pp. 271–282 (2014)

    Google Scholar 

  19. Menezes, A., Smart, N.: Security of signature schemes in a multi-user setting. In Designs, Codes and Cryptography (2004)

    Google Scholar 

  20. National Institute of Standards and Technology. Call for additional digital signature schemes for the post-quantum cryptography standardization process (2022). https://csrc.nist.gov/csrc/media/Projects/pqc-dig-sig/documents/call-for-proposals-dig-sig-sept-2022.pdf

  21. Pornin, T., Stern, J.P.: Digital signatures do not guarantee exclusive ownership. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 138–150. Springer, Heidelberg (2005). https://doi.org/10.1007/11496137_10

    Chapter  Google Scholar 

  22. Prest, T., et al.: FALCON. Technical report, National Institute of Standards and Technology (2020). https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization/round-3-submissions

Download references

Acknowledgments

Yu-Hsuan Huang is supported by the Dutch Research Agenda (NWA) project HAPKIDO (Project No. NWA.1215.18.002), which is financed by the Dutch Research Council (NWO). Jyun-Jie Liao is supported by Eshan Chattopadhyay’s NSF CAREER award 2045576. Patrick Struck acknowledges funding by the Hector Foundation II.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Hsuan Huang .

Editor information

Editors and Affiliations

Appendices

A Proof of Theorem 1

Proof

In the classical case, combining Lemma 1 and Theorem 2, for \( \mathcal{Z} = \mathcal{S}\mathcal{K}\times \mathcal{AUX}\) and \(q=q_A+q_S\) we obtain

$$\begin{aligned} \textbf{Adv}^{\textsf{sNR}^{H,\bot }}_{\textsf{BUFF}[ \mathcal{S} ,H]}( \mathcal{D} , \mathcal{A} ,\textsf{aux}) &\le q\cdot 4(q+1) ( \log | \mathcal{Z} | + \log (1/\epsilon ) + 1 )\epsilon + q_K\epsilon + \frac{q_D+1}{| \mathcal{Y} |}\\ &\le 8(q+1)^2 \big ( \log | \mathcal{Z} | + \log (1/\epsilon ) \big )\epsilon + q_K\epsilon + \frac{q_D+1}{| \mathcal{Y} |}\;, \end{aligned}$$

where the second inequality exploits that \(\log (1/\epsilon )\ge 1\). This concludes the classical bound.

Similarly, in the quantum case, combining Lemma 1 and Theorem 3, for \( \mathcal{Z} = \mathcal{S}\mathcal{K}\times \mathcal{AUX}\) and \(q=q_A+q_S\) we obtain

$$\begin{aligned} &\textbf{Adv}^{\textsf{sNR}^{H,\bot }}_{\textsf{BUFF}[ \mathcal{S} ,H]}( \mathcal{D} , \mathcal{A} ,\textsf{aux}) \le 2 q\cdot \sqrt{O\bigl ( ( \log | \mathcal{Z} | + \log (1/\epsilon ) + q) q \epsilon \bigr )} + q_K\epsilon + \frac{q_D+1}{| \mathcal{Y} |}\\ &\le O\bigl (\sqrt{ ( \log | \mathcal{Z} | + \log (1/\epsilon ) + q) q^3 \epsilon }\bigr ) + q_K\epsilon + \frac{q_D+1}{| \mathcal{Y} |}\text { as }\min (1/\epsilon ,| \mathcal{Z} |,q)\rightarrow \infty , \end{aligned}$$

where the constants in the asymptotic bounds are absolute constants. Hence, there are absolute constants \(n,C\ge 2\) such that

$$ \textbf{Adv}^{\textsf{sNR}^{H,\bot }}_{\textsf{BUFF}[ \mathcal{S} ,H]}( \mathcal{D} , \mathcal{A} ,\textsf{aux}) \le C\sqrt{ ( \log | \mathcal{Z} | + \log (1/\epsilon ) + q) q^3 \epsilon } + q_K\epsilon + \frac{q_D+1}{| \mathcal{Y} |}\;, $$

whenever \(\min (1/\epsilon ,| \mathcal{Z} |,q)\ge n\). In order to get a bound even when \(| \mathcal{Z} |<n\), we increase \(|\mathcal{AUX}|\) to \(n|\mathcal{AUX}|\) without actually changing the algorithm \(\textsf{aux}\), and so get

$$\begin{aligned} &\textbf{Adv}^{\textsf{sNR}^{H,\bot }}_{\textsf{BUFF}[ \mathcal{S} ,H]}( \mathcal{D} , \mathcal{A} ,\textsf{aux}) \le C\cdot \sqrt{\left( \log \frac{|\mathcal{S}\mathcal{K}|\cdot n|\mathcal{AUX}|}{\epsilon } + q\right) q^3\epsilon } + q_K\epsilon + \frac{q_D+1}{| \mathcal{Y} |}\\ &\le C\sqrt{2}\cdot \sqrt{\left( \log \frac{|\mathcal{S}\mathcal{K}|\cdot |\mathcal{AUX}|}{\epsilon } + q\right) q^3\epsilon } + q_K\epsilon + \frac{q_D+1}{| \mathcal{Y} |} \end{aligned}$$

whenever \(\min (1/\epsilon ,q)\ge n\), where the second inequality is via \(q + \log n\le q + n\le 2q\). Finally, since \(q\ge q_A\), the boundary condition of the above inequality can be relaxed to \(\min (1/\epsilon ,q_A)\ge n\). This concludes the proof.    \(\square \)

B Proof of Lemma 2

Proof

First, we note that the input \(z^\circ \) can be omitted, as it can be hardwired into \( \mathcal{A} \).

For the case \(k = 1\), consider \(H'\) to be a fresh random oracle, independent of H. Then, the distributions of \( \mathcal{A} ^H(H(x^u))\) and \( \mathcal{A} ^{H'}(H(x^u))\) coincide, unless a query of \( \mathcal{A} \) to H happens to be a query on \(x^u\), which happens with probability at most \(\frac{q}{| \mathcal{X} |}\). Thus

$$ \Pr \bigl [ x^u = \mathcal{A} ^H(H(x^u)) \bigr ] \le \Pr \bigl [ x^u = \mathcal{A} ^{H'}(H(x^u)) \bigr ] + \frac{q}{| \mathcal{X} |} \le \frac{q+1}{| \mathcal{X} |} \,. $$

For the case \(k > 1\), instead of considering \( \mathcal{A} ^H(H(x_k^u))\), the run of \( \mathcal{A} \) on the k-th instance, we consider a run of \( \mathcal{A} _k^H(H(x_k^u),T_{k-1})\), specified as follows. \( \mathcal{A} _k\) is given as additional input the collection \(T_{k-1}\) of transcripts of the runs of \( \mathcal{A} \) on the previous instances \(x_1^u,\ldots ,x_{k-1}^u\); this includes each instance \(x_i^u\) and its hash \(H(x_i^u)\), as well as all the hash queries and responses of these \(k-1\) runs of \( \mathcal{A} \). \( \mathcal{A} _k\) then simply runs \( \mathcal{A} \), but whenever \( \mathcal{A} \) is about to query H on an input that is contained in \(T_{k-1}\), it reads out the hash from there, instead of querying H. \( \mathcal{A} _k^H(H(x_k^u),T_{k-1})\) then obviously behaves identically to \( \mathcal{A} ^H(H(x_k^u))\). Furthermore, conditioned on any fixed \(T_{k-1}\), the distributions of \( \mathcal{A} _k^H(H(x_k^u),T_{k-1})\) and \( \mathcal{A} _k^{H'}(H'(x_k^u),T_{k-1})\) coincide, where again \(H'\) is a fresh random oracle, unless \(x_k^u\) happens to be contained in \(T_{k-1}\), which happens with probability \(\frac{(k-1)(q+1)}{ \mathcal{X} }\). Thus,

$$\begin{aligned} \Pr \bigl [ & x_k^u = \mathcal{A} ^H(H(x_k^u)) \mid x_i^u = \mathcal{A} ^H(H(x_i^u)) \,\forall \, i < k \bigr ] \\ & = \Pr \bigl [ x_k^u = \mathcal{A} _k^H(H(x_k^u),T_{k-1}) \,\big |\, x_i^u = \mathcal{A} ^H(H(x_i^u)) \,\forall \, i < k \bigr ] \\ & \le \Pr \bigl [ x_k^u = \mathcal{A} _k^{H'}(H'(x_k^u),T_{k-1}) \,\big |\, x_i^u = \mathcal{A} ^H(H(x_i^u)) \,\forall \, i < k \bigr ] + (k-1)\frac{q+1}{| \mathcal{X} |} \\ & \le k \frac{q+1}{| \mathcal{X} |} \end{aligned}$$

where the last inequality follows from the fact for any fixed choice of \(T_{k-1}\), we are back to the case \(k = 1\) due to the freshness of \(H'\). Multiplying these probability gives the claimed bound.    \(\square \)

Rights and permissions

Reprints and permissions

Copyright information

© 2025 International Association for Cryptologic Research

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Don, J., Fehr, S., Huang, YH., Liao, JJ., Struck, P. (2025). Hide-and-Seek and the Non-resignability of the BUFF Transform. In: Boyle, E., Mahmoody, M. (eds) Theory of Cryptography. TCC 2024. Lecture Notes in Computer Science, vol 15366. Springer, Cham. https://doi.org/10.1007/978-3-031-78020-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-78020-2_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-78019-6

  • Online ISBN: 978-3-031-78020-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics