Machine-Checked Security for XMSS as in RFC 8391 and SPHINCS+

Manuel Barbosa, François Dupressoir, Benjamin Grégoire, Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Abstract

This work presents a novel machine-checked tight security proof for XMSS —a stateful hash-based signature scheme that is (1) standardized in RFC 8391 and NIST SP 800-208, and (2) employed as a primary building block of SPHINCS +, one of the signature schemes recently selected for standardization as a result of NIST’s post-quantum competition. In 2020, Kudinov, Kiktenko, and Fedoro pointed out a flaw affecting the tight security proofs of SPHINCS + and XMSS. For the case of SPHINCS +, this flaw was fixed in a subsequent tight security proof by Hülsing and Kudinov. Unfortunately, employing the fix from this proof to construct an analogous tight security proof for XMSS would merely demonstrate security with respect to an insufficient notion. At the cost of modeling the message-hashing function as a random oracle, we complete the tight security proof for XMSS and formally verify it using the EasyCrypt proof assistant. (Note that this merely extends the use of the random oracle model, as this model is already required in other parts of the security analysis to justify the currently standardized parameter values). As part of this endeavor, we formally verify the crucial step common to the security proofs of SPHINCS + and XMSS that was found to be flawed before, thereby confirming that the core of the aforementioned security proof by Hülsing and Kudinov is correct. As this is the first work to formally verify proofs for hash-based signature schemes in EasyCrypt, we develop several novel libraries for the fundamental cryptographic concepts underlying such schemes—e.g., hash functions and digital signature schemes—establishing a common starting point for future formal verification efforts. These libraries will be particularly helpful in formally verifying proofs of other hash-based signature schemes such as LMS or SPHINCS +.

Original languageEnglish
Title of host publicationAdvances in Cryptology – CRYPTO 2023
Subtitle of host publication43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V
EditorsHelena Handschuh, Anna Lysyanskaya
Place of PublicationCham
PublisherSpringer
Chapter14
Pages421-454
Number of pages34
ISBN (Electronic)978-3-031-38554-4
ISBN (Print)978-3-031-38553-7
DOIs
Publication statusPublished - 2023
Event43rd Annual International Cryptology Conference, CRYPTO 2023 - Santa Barbara, United States
Duration: 20 Aug 202324 Aug 2023
Conference number: 43

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume14085
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference43rd Annual International Cryptology Conference, CRYPTO 2023
Abbreviated titleCRYPTO 2023
Country/TerritoryUnited States
CitySanta Barbara
Period20/08/2324/08/23

Funding

Acknowledgments. Andreas Hülsing and Matthias Meijers are funded by an NWO VIDI grant (Project No. VI.Vidi.193.066). We thank the Formosa Crypto consortium for support and discussions.

Keywords

  • Computer-Aided Cryptography
  • EasyCrypt
  • Formal Verification
  • Machine-Checked Proofs
  • SPHINCS
  • XMSS

Fingerprint

Dive into the research topics of 'Machine-Checked Security for XMSS as in RFC 8391 and SPHINCS+'. Together they form a unique fingerprint.

Cite this