+ All Categories
Home > Documents > HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June...

HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June...

Date post: 08-Oct-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
31
Henrich C. Pöhls , Kai Samelin, Joachim Posegga Chair of IT Security, University of Passau, Germany
Transcript
Page 1: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich  C.  Pöhls,    Kai  Samelin,    Joachim  Posegga  Chair  of  IT  Security,  University  of  Passau,  Germany  

Page 2: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2

A Sanitizable Signature Scheme allows •  a defined third party („sanitizer“) •  to alter defined parts of an already signed document

•  without invalidating the given signature, •  without interaction between signer and sanitizer.

Page 3: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 3

Generally  consists  of  five  algorithms:  1.   Setup:  Generate  key  pair  and  public  parameters  

2.   Sign:  Generate  a  Signature  over  sani8zable  and  immutable  parts  

3.   I-­‐Forge:  Change  sani8zable  parts  such  that  signature  is  s8ll  valid.  Requires  knowledge  of  the  „sani8zer  secret“.  

4.   U-­‐Forge:  Change  sani8zable  parts  such  that  signature  is  s8ll  valid.  Requires  two  different  „versions“,  i.e.  original  and  sani8zed  msg.  

5.   Verify:  Verify  signature‘s  validity.  Valid  iff  immutable  parts  are  unchanged  and  changing  the  sanitzed  parts  using  I-­‐Forge  or  U-­‐Forge.    

Page 4: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 4

•  Our  ImplementaLon  of  5  Schemes  in  JAVA  yields:  •  Tolerable  Performance  penalty  compared  to  SHA/RSA  (most  of  the  schemes)  

•  Integra8on  into  JAVA  Crypto  Framework  (JCA)  possible  (as  a  new  JAVA  Crypto  Provider)  

•  Integra8on  into  XML  Digital  Signature  Syntax  and  Processing  Standard  (W3C)  possible  

•  Changing  ProperLes  by  Mixing  Chameleon-­‐  and  SHA-­‐Hashes    

•  More  Precise  DefiniLon  of  3  ProperLes    Transparency  and  Strong-­‐  /  Weak-­‐Transparency  

Page 5: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 5

Project  Goal:  IT-­‐supported  Robust  &  Secure  Supply  Chains  Goal  of  University  of  Passau  /  InsLtute  of  IT  Security  and  Security  Law:  

•  Integrity  and  AuthenLcity  Statements  for  ParLal  Data  

•  Legal  Compliance,  Manage  &  Verify  the  Statements  

This  research  is  funded  by  BMBF  (FKZ:13N10966)  and  ANR  (France)  

Page 6: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 10

•  NoLon  appeared  in  literature  around  2005  in  work  of  G.  Ateniese,  D.  H.  Chou,  B.  de  Medeiros,  and  G.  Tsudik.  

•  Concept  also  described  in  earlier  works,  i.e.  Content  ExtracLon  Signatures  by  Steinfeld  et  al.  in  2001  

•  Ever  since:  Many  Schemes  

•  Many  Use  Cases:  i.e.  Freight  Document  

•  No  ImplementaLons    

•  Not  applied  on  a  large  scale  

Page 7: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 11

Ateniese  et  al.‘s  Scheme:  •  Sani8zable  Signature  based  on  Chameleon  hashes  (CH)  

•  Sani8zer  can  compute  hash  collisions,  if  trapdoor  informa8on  is  known  

•  Different  CH  usable  within  Ateniese  scheme  :  

1.   Krawczyk:  1st  chameleon  hash,  based  on  DLP  assump8on  

2.   Ateniese:  ID-­‐based  approach  3.   Zhang:  ID-­‐based  approach  without  an  UForge-­‐algorithm  

4.   Chen:  ID-­‐based  approach  without  the  key-­‐exposure-­‐problem  

5.  Miyazaki  et  al.‘s  scheme:  •  redactable  signature  scheme  based  on  commitments  

•  allows  just  dele8on  

•  controllable  redac8on  of  consecu8ve  sani8zers  

Page 8: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 12

1 !<?xml version="1.0" encoding="UTF-8" standalone="no"?>!2 !<PurchaseOrder>!3 ! <Item id="8492341">!

4 ! !<Description id="8492340">Video Game</Description>!5 ! !<Price>10.29</Price>!

6 ! </Item>!7 ! <Signature xmlns=“http://www.w3.org/2000/09/xmldsig#">!8 ! <SignedInfo>!

9 ! !<CanonicalizationMethod Algorithm=“http://www.w3.org/2001/10/xml-exc-c14n#"/>!10 ! !<SignatureMethod Algorithm=“http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>!

11 ! !<Reference URI=“#xpointer(id('8492340'))">!12 ! ! <Transforms>!13 ! ! <Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>!

14 ! ! </Transforms>!15 ! ! <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>!

16 ! ! <DigestValue>ABYPTWCzr8F7dXlUKyg1C+tycm4=</DigestValue>!17 ! !</Reference>!18 ! </SignedInfo>!

19   <SignatureValue>D9hok43bgiRJ9uzp/7A9MA2YZBFuivvzoZTbC(....)DsFCXjtkRxQ==</SignatureValue>!20 ! </Signature>!

21 !</PurchaseOrder>!

1.  

2.  

3.  

4.  

Page 9: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 13

1 !<?xml version="1.0" encoding="UTF-8" standalone="no"?>!2 !<PurchaseOrder>!3 ! <Item id="8492341">!

4 ! !<Description id="8492340">Video Game</Description>!5 ! !<Price>10.29</Price>!

6 ! </Item>!7 ! <Signature xmlns=“http://www.w3.org/2000/09/xmldsig#">!8 ! <SignedInfo>!

9 ! !<CanonicalizationMethod Algorithm=„http://www.w3.org/2001/10/xml-exc-c14n#"/>!10 ! !<SignatureMethod Algorithm=“http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>!

11 ! !<Reference URI=“#xpointer(id('8492340'))">!12 ! ! <Transforms>!13 ! ! <Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>!

14 ! ! </Transforms>!15   ! <DigestMethod Algorithm=“http://www.example.org/xmldsig-more#chamhashdisc">!

16   ! <ChamHashDiscKeyValue>!17   ! <p>Aa5Mue7ppx2YD7R8KXUqQIKSTSay6jHhWm9L0dxHpL2P</p>!18   ! <q>1yZc93TTjswH2j4UupUgQUkmk1l1GPCtN6Xo7iPSXsc=</q>!

19   ! <r>FQrJPkWb0JwiffjrAdbWAoyropQmNohMgEy6ABsvptQ=</r>!20   ! <g>JtqJ1H0NL0Is+6Y797XKQ1hbHc+HYgoGQAkvK8h+q8Y=</g>!

21   ! <y>AVwdxMlXF6HIHRHl0r7Xoojb0VoB7ZBP4Dxc83BDDgxG</y>!22   ! </ChamHashDiscKeyValue>!23   ! </DigestMethod>!

24   ! <DigestValue>8Xt2AtyvB3Umwf8LlyrGSVnvLc4=</DigestValue>!25   !</Reference>!

26   </SignedInfo>!27   <SignatureValue>D9hok43bgiRJ9uzp/7A9MA2YZBFuivvzoZTbC(....)DsFCXjtkRxQ==</SignatureValue>!28   </Signature>!

29   </PurchaseOrder>!

1.  

2.  

new  

4.  

3.  

Page 10: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 14

1 !<?xml version="1.0" encoding="UTF-8" standalone="no"?>!2 !<PurchaseOrder>!3 ! <Item id="8492341">!

4 ! !<Description id="8492340">Video Game</Description>!5 ! !<Price>10.29</Price>!

6 ! </Item>!7 ! <Signature xmlns=“http://www.w3.org/2000/09/xmldsig#">!8 ! <SignedInfo>!

9 ! !<CanonicalizationMethod Algorithm=„http://www.w3.org/2001/10/xml-exc-c14n#"/>!10 ! !<SignatureMethod Algorithm=“http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>!

11 ! !<Reference URI=“#xpointer(id('8492340'))">!12 ! ! <Transforms>!13 ! ! <Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>!

14 ! ! </Transforms>!15   ! <DigestMethod Algorithm=“http://www.example.org/xmldsig-more#chamhashdisc">!

16   ! </DigestMethod>!17   ! <DigestValue>8Xt2AtyvB3Umwf8LlyrGSVnvLc4=</DigestValue>!18   !</Reference>!

19   </SignedInfo>!20   <SignatureValue>D9hok43bgiRJ9uzp/7A9MA2YZBFuivvzoZTbC(....)DsFCXjtkRxQ==</SignatureValue>!

21   <ChamHashDiscKeyValue Id=“#xpointer(id('8492340'))">!22   ! <p>Aa5Mue7ppx2YD7R8KXUqQIKSTSay6jHhWm9L0dxHpL2P</p>!23   ! <q>1yZc93TTjswH2j4UupUgQUkmk1l1GPCtN6Xo7iPSXsc=</q>!

24   ! <r>FQrJPkWb0JwiffjrAdbWAoyropQmNohMgEy6ABsvptQ=</r>!25   ! <g>JtqJ1H0NL0Is+6Y797XKQ1hbHc+HYgoGQAkvK8h+q8Y=</g>!

26   ! <y>AVwdxMlXF6HIHRHl0r7Xoojb0VoB7ZBP4Dxc83BDDgxG</y>!27   </ChamHashDiscKeyValue>!28   </Signature>!

29   </PurchaseOrder>!

1.  

2.  

new  

3.  

4.  

Page 11: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 15

2.010.624  

2.219.806  

2.472.972  

2.424.781  

3.645.070  

2.675.284  

1.373.907  

1.301.410  

1.366.284  

1.278.295  

1.908.047  

1.339.633  

0   500000   1000000   1500000   2000000   2500000   3000000   3500000   4000000  

RSA/SHA-­‐512  

Krawczyk  

Ateniese  

Chen    

Zhang  128  

Miyazaki  

Genera8on     Valida8on    

Page 12: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 16

400.119  

11.082.481  

7.856  

68.319  

243.040  

4.700  

1   10   100   1.000   10.000   100.000   1.000.000  10.000.000  100.000.000  

RSA/SHA-­‐512  

Krawczyk  512Bit  

Ateniese  512Bit  

Chen  512Bit  

Zhang  128Bit  

Miyazaki  512Bit    

Page 13: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 18

excluding  key  generaLon  &  setup:    similar  runLme  as  SHA/RSA  for  signature  generaLon  and  validaLon  

 excepLon:  Zhang  et  al.’s  scheme  based  on  EllipLc  Curve  Crypto    

including  key  generaLon  &  setup:    Overall:  Chameleon  Hash  by  Ateniese  et  al.  performs  best  

400.119  

11.082.481  

7.856  

68.319  

243.040  

4.700  

1   10   100   1000   10000   100000   1000000   10000000   100000000  

RSA/SHA-­‐512  

Krawczyk  512Bit  

Ateniese  512Bit  

Chen  512Bit  

Zhang  128Bit  

Miyazaki  512Bit    

Setup  incl.  Key  GeneraLon  in  micro  seconds    

Page 14: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 19

excluding  key  generaLon  &  setup:    similar  runLme  as  SHA/RSA  for  signature  generaLon  and  validaLon  

 excepLon:  Zhang  et  al.’s  scheme  based  on  EllipLc  Curve  Crypto    

including  key  generaLon  &  setup:    Overall:  Chameleon  Hash  by  Ateniese  et  al.  performs  best  

comparison  of  just  one  execuLon  is  not  always  enough:    key  exposure  problem  

 “a  forged  message  and  a  original  message  leaks  the  secret    and  allows  to  U-­‐Forge  other  messages  under  the  same  key”    

Page 15: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 21

excluding  key  generaLon  &  setup:    similar  runLme  as  SHA/RSA  for  signature  generaLon  and  validaLon  

 excepLon:  Zhang  et  al.’s  scheme  based  on  EllipLc  Curve  Crypto    

including  key  generaLon  &  setup:    Overall:  Chameleon  Hash  by  Ateniese  et  al.  performs  best  

comparison  of  just  one  execuLon  is  not  always  enough:    suffer  from  key  exposure  

   Krawczyk  et  al.  (needs  new  key  for  each  message)      

 key  exposure  problem  reducLon  possible  

   Ateniese  et  al.  (using  one  8me  Transac8onIDs)    key  exposure  free  

   Chen  et  al.  &  Zhang  et  al.  

ID based  schemes  

Page 16: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 22

Message  is  split  into  parts  (mj)  ,  each  hashed  independently  

= m1 || ... || mi Message:  

Signature:  

:  a  Chameleon  Hash  func8on  

ki    :    secret  key  given  to  the  Sani8zer  needed  for  I-­‐Forge  ui    :    secret  key  that  is  safely  discarded  

Page 17: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 23

Ateniese  et  al.  define  “Transparency”:  Given  a  signed  message  with  a  valid  signature,    no  party  –  except  the  signer  and  the  censor  –    should  be  able  to  correctly  guess  whether    

the  message  has  been  sani<zed.  

Ateniese  et  al.  divided  this  into    

“Weak  Transparency“:    (...)  the  verifier  knows  exactly  which  parts  of  the  message    

are  poten<ally  sani<zable  (...)  

“Strong  Transparency“:  (...)  the  verifier  does  not  know  which  parts  of  the  message  (...)    

could  poten<ally  be  sani<zable.  

Page 18: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 24

Message  is  split  into  parts  (mj)  ,  each  hashed  independently  

= m1 || ... || mi Message:  

Signature:  

:  a  Chameleon  Hash  func8on                                    

ki    :    secret  key  given  to  the  Sani8zer  needed  for  I-­‐Forge  ui    :    secret  key  that  is  safely  discarded  

Proper8es:    TRANSPARENCY        &        STRONG  TRANSPARENCY                

Page 19: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 25

Message  is  split  into  parts  (mj)  ,  each  hashed  independently  

= m1 || ... || mi + Message:  

Signature:  

:  a  Chameleon  Hash  func8on                                  :  a  Standard  Crypto.  Hash  

ki    :    secret  key  given  to  the  Sani8zer  needed  for  I-­‐Forge  ui    :    secret  key  that  is  safely  discarded  

Page 20: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 26

Message  is  split  into  parts  (mj)  ,  each  hashed  independently  

= m1 || ... || mi + Message:  

Signature:  

:  a  Chameleon  Hash  func8on                                  :  a  Standard  Crypto.  Hash  

ki    :    secret  key  given  to  the  Sani8zer  needed  for  I-­‐Forge  ui    :    secret  key  that  is  safely  discarded  

Proper8es:      NO    TRANSPARENCY        &        STRONG  TRANSPARENCY                

Page 21: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 27

ExisiLng  definiLons  of  Transparency:    

•  T  always  implies  WT  or  ST  •  WT  or  ST  always  implies  T  •  T    ST  or  WT  

Page 22: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 28

ExisiLng  definiLons  of  Transparency:    

•  T  always  implies  WT  or  ST  •  WT  or  ST  always  implies  T  •  T    ST  or  WT  

PracLcally,  a  verifier  either  knows  which  mi  is  potenLally  saniLzable  or  he  does  not:    •             (ST  or  WT)  

•  The  result:  T  is  always  true  

Page 23: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 29

ExisiLng  definiLons  of  Transparency:    

•  T  always  implies  WT  or  ST  •  WT  or  ST  always  implies  T  •  T    ST  or  WT  

PracLcally,  a  verifier  either  knows  which  mi  is  potenLally  saniLzable  or  he  does  not:    •             (ST  or  WT)  

•  The  result:  T  is  always  true  We  found  this  counter  intuiLve  and    the  Mixing  Example  showed  no  T  ,  but  sLll  has  ST  

Page 24: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 30

Transparency  makes  a  statement  about    the  detecLon  of  a  saniLzed  document.  

Weak  and  Strong  Transparency  make  statements  about  

 the  detecLon  of  saniLzable  subdocuments.  

Weak  and  Strong  Transparency  are    

independent  from  Transparency.  

Page 25: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 31

1.   JAVA  ImplementaLon  of  5  SaniLzable  Sign.  Schemes:  •  Mostly  a  tolerable  performance  penalty  over  SHA/RSA  

•  Full  JCA  integra8on  as  JAVA  Crypto  Provider  •  Integra8on  into  XML  Digital  Signature  Syntax  and  Processing  Standard  (W3C)  

2.   Mixing  Signature  /  Hash  Algorithms  is  easy  and  “natural”  using  XML’s  <references>!

•  Allows  fine-­‐grained  control  over  Scheme’s  proper8es  like  Transparency  

3.    Property  of  Transparency  is  independent  from    Strong-­‐/Weak-­‐Transparency  and  has  a  different  scope  

Page 26: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 32

1.   JAVA  ImplementaLon  of  5  SaniLzable  Sign.  Schemes:  •  Mostly  a  tolerable  performance  penalty  over  SHA/RSA  

•  Full  JCA  integra8on  as  JAVA  Crypto  Provider  •  Integra8on  into  XML  Digital  Signature  Syntax  and  Processing  Standard  (W3C)  

2.   Mixing  Signature  /  Hash  Algorithms  is  easy  and  “natural”  using  XML’s  <references>!

•  Allows  fine-­‐grained  control  over  Scheme’s  proper8es  like  Transparency  

3.    Property  of  Transparency  is  independent  from    Strong-­‐/Weak-­‐Transparency  and  has  a  different  scope  

Page 27: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 33 04.06.2011 33

Page 28: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 34

Page 29: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 35

7  

3  

410  

1.878  

929.648  11.400  

70  

1   10   100   1000   10000   100000   1000000  

RSA/SHA-­‐512  

Krawczyk  512Bit  

Ateniese  512Bit  

Chen  512Bit  

Zhang  128Bit  

Miyazaki  512Bit    

Miyazaki  512Bit  (vrfy)  

Calculate  /  Verify  Hash  in  micro  seconds    

Page 30: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 36

4  

424  

248.280  

381.215  

1   10   100   1000   10000   100000   1000000  

RSA/SHA-­‐512  

Krawczyk  512Bit  

Ateniese  512Bit  

Chen  512Bit  

Zhang  128Bit  

Miyazaki  512Bit    

Miyazaki  512Bit  (vrfy)  

I-­‐Forgery  in  micro  seconds    

0

not possible

Page 31: HenrichC.Pöhls ,Kai Samelin,JoachimPosegga · Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 2 A Sanitizable Signature Scheme allows • a defined third party („sanitizer“)

Henrich C. Pöhls et al. – ACNS 2011 – 08 June 2011 37

Test  Setup:  •  Intel  T8300  Dual  Core  @  2.40  Ghz  and  4  GiB  of  RAM.  

•  Algorithms  coded  in  JAVA  

•  Not  opLmized  •  make  heavy  use  of  JAVA’s  BigInteger  class  

•  Integrated  into  JAVA  Cryptographic  Framework  (JCA)  without  modifying  the  JCA  

•  Input:  XML  File  (JAVA  JCA  Signature  Example  File)  

•  1  Reference  •  Fixed  size  (achievable  by  applying  Standard  Crypto.  Hash  1st)  


Recommended