Abstract
Digital signatures are widely deployed to authenticate the source of incoming information, or to certify data integrity. Common signature verification procedures return a decision (accept/reject) only at the very end of the execution. If interrupted prematurely, however, the verification process cannot infer any meaningful information about the validity of the given signature. We notice that this limitation is due to the algorithm design solely, and it is not inherent to signature verification.
In this work, we provide a formal framework to handle interruptions during signature verification. In addition, we propose a generic way to devise alternative verification procedures that progressively build confidence on the final decision. Our transformation builds on a simple but powerful intuition and applies to a wide range of existing schemes considered to be post-quantum secure including the NIST finalist Rainbow.
While the primary motivation of progressive verification is to mitigate unexpected interruptions, we show that verifiers can leverage it in two innovative ways. First, progressive verification can be used to intentionally adjust the soundness of the verification process. Second, progressive verifications output by our transformation can be split into a computationally intensive offline set-up (run once) and an efficient online verification that is progressive.
In this work, we provide a formal framework to handle interruptions during signature verification. In addition, we propose a generic way to devise alternative verification procedures that progressively build confidence on the final decision. Our transformation builds on a simple but powerful intuition and applies to a wide range of existing schemes considered to be post-quantum secure including the NIST finalist Rainbow.
While the primary motivation of progressive verification is to mitigate unexpected interruptions, we show that verifiers can leverage it in two innovative ways. First, progressive verification can be used to intentionally adjust the soundness of the verification process. Second, progressive verifications output by our transformation can be split into a computationally intensive offline set-up (run once) and an efficient online verification that is progressive.
Original language | English |
---|---|
Title of host publication | Applied Cryptography and Network Security |
Subtitle of host publication | 20th International Conference, ACNS 2022, Rome, Italy, June 20–23, 2022, Proceedings |
Publisher | Springer |
Pages | 440-458 |
Number of pages | 19 |
ISBN (Electronic) | 978-3-031-09234-3 |
ISBN (Print) | 978-3-031-09233-6 |
DOIs | |
Publication status | Published - 2022 |
Event | 20th International Conference on Applied Cryptography and Network Security, ACNS 2022 - Rome, Italy Duration: 2022 Jun 20 → 2022 Jun 23 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 13269 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 20th International Conference on Applied Cryptography and Network Security, ACNS 2022 |
---|---|
Country/Territory | Italy |
City | Rome |
Period | 2022/06/20 → 2022/06/23 |
Subject classification (UKÄ)
- Computer Science