Abstract
The BUFF transform, due to Cremers et al. (S&P’21), is a generic transformation for digital signature scheme, with the purpose of obtaining additional security guarantees beyond unforgeability: exclusive ownership, message-bound signatures, and non-resignability. Non-resignability (which essentially challenges an adversary to re-sign an unknown message for which it only obtains the signature) turned out to be a delicate matter, as recently Don et al. (CRYPTO’24) showed that the initial definition is essentially unachievable; in particular, it is not achieved by the BUFF transform. This led to the introduction of new, weakened versions of non-resignability, which are (potentially) achievable. In particular, it was shown that a salted variant of the BUFF transform does achieves some weakened version of non-resignability. However, the salting requires additional randomness and leads to slightly larger signatures. Whether the original BUFF transform also achieves some meaningful notion of non-resignability remained a natural open question.
In this work, we answer this question in the affirmative. We show that the BUFF transform satisfies the (almost) strongest notions of non-resignability one can hope for, facing the known impossibility results. Our results cover both the statistical and the computational case, and both the classical and the quantum setting. At the core of our analysis lies a new security game for random oracles that we call Hide-and-Seek. While seemingly innocent at first glance, it turns out to be surprisingly challenging to rigorously analyze.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
There are hypothetical signature schemes to which the attack from [13] does not apply, though we are not aware of any natural scheme for which that is the case.
- 2.
We note that the statistic and the computational variants of \(\textsf{NR}^{H,\bot }\) are incomparable: in the computational case, the adversary is restricted in its computational power but is bound to a weaker entropy condition.
- 3.
Here and in the remainder, we borrow from set notation to indicate the input and output space of (oracle) algorithms. In case of an algorithm that takes no input, we write the singleton set \(\{\bot \}\) as domain.
- 4.
The hint function may be randomized, but we refer to it as a function for convenience.
- 5.
References
Ambainis, A., Hamburg, M., Unruh, D.: Quantum security proofs using semi-classical oracles. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11693, pp. 269–295. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-26951-7_10
Aulbach, T., Düzlü, S., Meyer, M., Struck, P., Weishäupl, M.: Hash your keys before signing: BUFF security of the additional NIST PQC signatures. In: Saarinen, M.J., Smith-Tone, D. (eds.) PQCrypto 2024. LNCS, vol. 14772, pp. 301–335. Springer, Cham (2024). https://doi.org/10.1007/978-3-031-62746-0_13
Ayer, A.: Duplicate signature key selection attack in let’s encrypt. https://www.agwa.name/blog/post/duplicate_signature_key_selection_attack_in_lets_encrypt (2015)
Baecher, P., Fischlin, M., Schröder, D.: Expedient non-malleability notions for hash functions. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 268–283. Springer, Heidelberg (2011)
Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Denning, D.E., Pyle, R., Ganesan, R., Sandhu, R.S., Ashby, V. (eds.) ACM CCS 93, pp. 62–73. ACM Press (1993)
Blake-Wilson, S., Menezes, A.: Unknown key-share attacks on the station-to-station (STS) protocol. In: Imai, H., Zheng, Y. (eds.) PKC’99. LNCS, vol. 1560, pp. 154–170. Springer, Heidelberg (1999)
Boneh, D., Dagdelen, Ö., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 41–69. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25385-0_3
Chung, K.-M., Guo, S., Liu, Q., Qian, L.: Tight quantum time-space tradeoffs for function inversion. In: 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS), pp. 673–684 (2020)
Coretti, S., Dodis, Y., Guo, S., Steinberger, J.: Random oracles and non-uniformity. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10820, pp. 227–258. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78381-9_9
Cremers, C., Düzlü, S., Fiedler, R., Fischlin, M., Janson, C.: BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. In: 2021 IEEE Symposium on Security and Privacy, pp. 1696–1714. IEEE Computer Society Press (2021). Cryptology ePrint Archive version https://eprint.iacr.org/archive/2020/1525/20230116:141028 (Version 1.3)
Cremers, C., Düzlü, S., Fiedler, R., Fischlin, M., Janson, C.: BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures, 2023. An updated version (Version 1.4.1) of [10], https://eprint.iacr.org/archive/2020/1525/20231023:114351
Dodis, Y., Guo, S., Katz, J.: Fixing cracks in the concrete: random oracles with auxiliary input, revisited. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 473–495. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56614-6_16
Don, J., Fehr, S., Huang, Y.-H., Struck, P.: On the (in)security of the BUFF transform. In: Reyzin, L., Stebila, D. (eds.) CRYPTO 2024. LNCS, vol. 14920, pp. 246–275. Springer, Cham (2024). https://doi.org/10.1007/978-3-031-68376-3_8
Düzlü, S., Fiedler, R., Fischlin, M.: BUFFing FALCON without increasing the signature size. In: SAC 2024. LNCS (2024, to appear). Cryptology ePrint Archive version available at https://eprint.iacr.org/2024/710
Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM J. Comput. 28(4), 1364–1396 (1999)
Hsiao, C.-Y., Lu, C.-J., Reyzin, L.: Conditional computational entropy, or toward separating pseudoentropy from compressibility. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 169–186. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72540-4_10
Jackson, D., Cremers, C., Cohn-Gordon, K., Sasse, R.: Seems legit: automated analysis of subtle attacks on protocols that use signatures. In: Cavallaro, L., Kinder, J., Wang, X., Katz, J. (eds.) ACM CCS 2019, pp. 2165–2180. ACM Press (2019)
Kim, T.H.-J., Basescu, C., Jia, L., Lee, S.B., Hu, Y.-C., Perrig, A.: Lightweight source authentication and path validation. In: Proceedings of the 2014 ACM Conference on SIGCOMM, pp. 271–282 (2014)
Menezes, A., Smart, N.: Security of signature schemes in a multi-user setting. In Designs, Codes and Cryptography (2004)
National Institute of Standards and Technology. Call for additional digital signature schemes for the post-quantum cryptography standardization process (2022). https://csrc.nist.gov/csrc/media/Projects/pqc-dig-sig/documents/call-for-proposals-dig-sig-sept-2022.pdf
Pornin, T., Stern, J.P.: Digital signatures do not guarantee exclusive ownership. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 138–150. Springer, Heidelberg (2005). https://doi.org/10.1007/11496137_10
Prest, T., et al.: FALCON. Technical report, National Institute of Standards and Technology (2020). https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization/round-3-submissions
Acknowledgments
Yu-Hsuan Huang is supported by the Dutch Research Agenda (NWA) project HAPKIDO (Project No. NWA.1215.18.002), which is financed by the Dutch Research Council (NWO). Jyun-Jie Liao is supported by Eshan Chattopadhyay’s NSF CAREER award 2045576. Patrick Struck acknowledges funding by the Hector Foundation II.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
A Proof of Theorem 1
Proof
In the classical case, combining Lemma 1 and Theorem 2, for \( \mathcal{Z} = \mathcal{S}\mathcal{K}\times \mathcal{AUX}\) and \(q=q_A+q_S\) we obtain
where the second inequality exploits that \(\log (1/\epsilon )\ge 1\). This concludes the classical bound.
Similarly, in the quantum case, combining Lemma 1 and Theorem 3, for \( \mathcal{Z} = \mathcal{S}\mathcal{K}\times \mathcal{AUX}\) and \(q=q_A+q_S\) we obtain
where the constants in the asymptotic bounds are absolute constants. Hence, there are absolute constants \(n,C\ge 2\) such that
whenever \(\min (1/\epsilon ,| \mathcal{Z} |,q)\ge n\). In order to get a bound even when \(| \mathcal{Z} |<n\), we increase \(|\mathcal{AUX}|\) to \(n|\mathcal{AUX}|\) without actually changing the algorithm \(\textsf{aux}\), and so get
whenever \(\min (1/\epsilon ,q)\ge n\), where the second inequality is via \(q + \log n\le q + n\le 2q\). Finally, since \(q\ge q_A\), the boundary condition of the above inequality can be relaxed to \(\min (1/\epsilon ,q_A)\ge n\). This concludes the proof. \(\square \)
B Proof of Lemma 2
Proof
First, we note that the input \(z^\circ \) can be omitted, as it can be hardwired into \( \mathcal{A} \).
For the case \(k = 1\), consider \(H'\) to be a fresh random oracle, independent of H. Then, the distributions of \( \mathcal{A} ^H(H(x^u))\) and \( \mathcal{A} ^{H'}(H(x^u))\) coincide, unless a query of \( \mathcal{A} \) to H happens to be a query on \(x^u\), which happens with probability at most \(\frac{q}{| \mathcal{X} |}\). Thus
For the case \(k > 1\), instead of considering \( \mathcal{A} ^H(H(x_k^u))\), the run of \( \mathcal{A} \) on the k-th instance, we consider a run of \( \mathcal{A} _k^H(H(x_k^u),T_{k-1})\), specified as follows. \( \mathcal{A} _k\) is given as additional input the collection \(T_{k-1}\) of transcripts of the runs of \( \mathcal{A} \) on the previous instances \(x_1^u,\ldots ,x_{k-1}^u\); this includes each instance \(x_i^u\) and its hash \(H(x_i^u)\), as well as all the hash queries and responses of these \(k-1\) runs of \( \mathcal{A} \). \( \mathcal{A} _k\) then simply runs \( \mathcal{A} \), but whenever \( \mathcal{A} \) is about to query H on an input that is contained in \(T_{k-1}\), it reads out the hash from there, instead of querying H. \( \mathcal{A} _k^H(H(x_k^u),T_{k-1})\) then obviously behaves identically to \( \mathcal{A} ^H(H(x_k^u))\). Furthermore, conditioned on any fixed \(T_{k-1}\), the distributions of \( \mathcal{A} _k^H(H(x_k^u),T_{k-1})\) and \( \mathcal{A} _k^{H'}(H'(x_k^u),T_{k-1})\) coincide, where again \(H'\) is a fresh random oracle, unless \(x_k^u\) happens to be contained in \(T_{k-1}\), which happens with probability \(\frac{(k-1)(q+1)}{ \mathcal{X} }\). Thus,
where the last inequality follows from the fact for any fixed choice of \(T_{k-1}\), we are back to the case \(k = 1\) due to the freshness of \(H'\). Multiplying these probability gives the claimed bound. \(\square \)
Rights and permissions
Copyright information
© 2025 International Association for Cryptologic Research
About this paper
Cite this paper
Don, J., Fehr, S., Huang, YH., Liao, JJ., Struck, P. (2025). Hide-and-Seek and the Non-resignability of the BUFF Transform. In: Boyle, E., Mahmoody, M. (eds) Theory of Cryptography. TCC 2024. Lecture Notes in Computer Science, vol 15366. Springer, Cham. https://doi.org/10.1007/978-3-031-78020-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-031-78020-2_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-78019-6
Online ISBN: 978-3-031-78020-2
eBook Packages: Computer ScienceComputer Science (R0)