Re: [Cfrg] Internet-Draft: Collective Edwards-Curve Digital Signature Algorithm

Bryan Ford <> Wed, 05 July 2017 13:11 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id BBB45131CF4 for <>; Wed, 5 Jul 2017 06:11:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (2048-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id 8RKBwTBpRecD for <>; Wed, 5 Jul 2017 06:11:50 -0700 (PDT)
Received: from ( [IPv6:2a00:1450:400c:c09::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 74CDE131CB0 for <>; Wed, 5 Jul 2017 06:11:49 -0700 (PDT)
Received: by with SMTP id 62so222356035wmw.1 for <>; Wed, 05 Jul 2017 06:11:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20161025; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=GHNZ95akZo7drPIYCl5zaY+mVkexX42Xl8N+xGmLNQA=; b=X2rCZjOXqc3Jwi0eUpMwngbNYDy6t+uNf0FWCDcXaAQSBlk87i1tWO6lvf5eKpiMnJ A2ZAlrZCh0oVvKN7HRYn5xXpN/FmxTxFnM+rb/NpXx4TwNA9i2c2B0HpPEbIO0oNzZVJ ZXjggHnWOGeMOPjoqgLrnJq4TxVh1siGItY8KnhFPobznOFqUWNYViCsyw/D4Hf5F0PK vF7EeFwy58znSG1W5au3qUpDnfqqEBsgCtnVKIUOQ6Ar4AXBYBkMgBZJpsIHwdf1zrzV wfVsj8NcF/52DK9QPbRWE3k5fxxCo6KuwNGs/s64xjXSDxuTqL2/1GPd3bFa7biTAKlc OZgw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=GHNZ95akZo7drPIYCl5zaY+mVkexX42Xl8N+xGmLNQA=; b=s0ZYyVaMGUwv+MMb0n9rGt/HuNcTyUjIFpPyufc4k++kiw1+FN7ejm9usDuPTcp+yU BZjHXHI6uEa4aMVCDRIQ1bwbaxfr9WwMa/Bmv/drR5tpD4qb7wv2tRVoXMbkidw2zbi1 iKHF8S3GWyMxNWYIw5WKhwz50GyWMmlMTq+WT8zGPG2nlKL8uDkgSSr8RrDrgsoDaxe6 nBL0uEXa+OXCMunIuhfiBErCFwO5vflNwoKMNxD2EQvdyZjfD+Rap/jz3jJEL4QhsOcx 5Dw6b50Q2kYzP0ctXF/WX7Bm7xTQLZClZJZl89h5CVNt2Pkfp/JxemcGi53tz1H/FBZc uGOA==
X-Gm-Message-State: AKS2vOykEIWrX9hQ0J6/cEXPoB9P7K9tcu/AWmm1sapp21kxiooSjeQm 7YugUTqsDbzHaI9eJIw=
X-Received: by with SMTP id j88mr19891818wmi.33.1499260307905; Wed, 05 Jul 2017 06:11:47 -0700 (PDT)
Received: from [] ( []) by with ESMTPSA id h10sm11431707wme.30.2017. (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 05 Jul 2017 06:11:46 -0700 (PDT)
From: Bryan Ford <>
Message-Id: <>
Content-Type: multipart/signed; boundary="Apple-Mail=_C4E4CACE-761E-4B3F-B41D-B27E8D7044A1"; protocol="application/pgp-signature"; micalg=pgp-sha256
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Date: Wed, 5 Jul 2017 15:11:36 +0200
In-Reply-To: <>
Cc: Philipp Jovanovic <>,
To: Daniel Slamanig <>
References: <> <>
X-Mailer: Apple Mail (2.3273)
Archived-At: <>
Subject: Re: [Cfrg] Internet-Draft: Collective Edwards-Curve Digital Signature Algorithm
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Crypto Forum Research Group <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Wed, 05 Jul 2017 13:11:53 -0000

Hi Daniel, thanks for your thoughts on the commitment-to-the-bitmask issue.

Your proposal of using a chameleon hash, to allow the leader to “adjust” the bit mask after the commit c has been established, is an interesting idea. However, if I understand it correctly, if the leader holds the trapdoor key for the chameleon hash, wouldn’t that still make the final collective signature malleable for the leader (or for anyone the leader’s trapdoor key might leak to)?  The CoSi protocol as currently defined is intended to ensure that the leader has no special privilege or trust with respect to other cosigners: i.e., the leader is merely an ordinary participant, but is simply the one who for whatever reason decides to initiate the cosigning operation.  Giving the leader special powers - e.g., making the signature malleable to the leader but not to others - would break this principle and need to be extremely carefully considered I think.

To follow up on my last message to Oleg, again I suggest reading section IV of our CoSi paper from IEEE S&P last year ( <>), as it discusses several related issues, especially the potential desire to allow the leader to complete a collective signing procedure even with only a subset of “committed” participants remaining present in the “response” phase.  In particular, the leader can form all the individual Schnorr commits into a Merkle tree, and make the real commit c be the root of that Merkle tree.  In this way, the leader is committing not so much to a particular collective Schnorr commit but rather to *all possible* Schnorr commits that can be composed from any subset of the individual Schnorr commits within that Merkle tree.  This way, if some of the participants whose commits are present in that Merkle tree remain available during the response phase but others drop out, the leader can still use the commit c and form a correct and verifiable collective signature against the particular subset of Schnorr commits from nodes that remained available throughout the process, without restarting.

I guess this approach does, in a slightly different way, make the resulting collective signatures slightly malleable to the leader: from a given set of commit-time and response-time information, the leader could put together distinct collective signatures representing different subsets of response-time participants.  Some form of “leader-malleability” of this kind seems unavoidably essential to enabling the leader to complete a collective signing round in the presence of partial failures without restarting.  Perhaps the same limited leader-malleability is more-or-less the same property your suggestion of using chameleon hashes has, although I haven’t had a chance to compare them deeply yet.

But at any rate, the higher-level tradeoff here to consider is whether it’s better to (a) enforce strict non-malleability of collective signatures (by anyone, leader included), at the cost of O(N)-round DoS attack vulnerability during signing due to the need to restart partially failed rounds, or (b) provide some limited form of limited leader-malleability in order to support restart-free operation and avoid DoS attacks during signing, at the cost of a more complex protocol (and perhaps slightly more “special” trust in the leader than we might like).

Again, further thoughts on this and other topics are most welcome.


> On Jul 3, 2017, at 7:34 PM, Daniel Slamanig <> wrote:
> Hi Philipp,
> looks interesting!
> After looking at the protocol I also have some security concerns (related to what has been raised by Oleg in a previous mail).
> Not committing to Z as well as the actual sum of signers public keys A' in the computation of the hash c for the signature seems to be problematic.
> It seems to me that committing Z in the signature in plain as well as A' does not work given the later application of the signing procedure (where till the end of the protocol it is not clear who actually participates in the signing but c must be known at the beginning).
> Committing to neither of both however seems problematic as it does not fix the set of actual signers.
> This could be circumvented by allowing an honest leader to adapt the commitment to the final Z (and A') after it knows the signers without modifying the initially computed c using a chameleon hash (trapdoor commitment). I use P as a generator below, omit the brackets [a]P notation for scalar multiplication and write it from the perspective of the leader, i.e., the signer that initiates the protocol.
> The leader could choose chameleon hash parameters sk_ch=y for random y and pk_ch=(P,Y=yP) and add pk_ch and chameleon hash CH(Z'):=h(Z')P+u'Y for randomly chosen u' to the computation of c, i.e., set c=H(R||A||pk_ch||CH(Z')||S), where h() is a collision resistant hash function (this is just the standard way of constructing a chameleon hash from DL for arbitrary message spaces as propsed in [1]). If Z' is not yet known one simply sets Z' to some fixed string at the beginning, e.g., Z':=0. At the end of the protocol, when the leader knows the exact signers, it can update Z' to the final value Z and use sk_ch to compute a collision in the chameleon hash, i.e., such that CH(Z)=CH(Z') by solving h(Z')+u'y = h(Z)+uy for u. He then adds u and Z as well as pk_ch to the signature, i.e., sets it as (R,s,u,Z,pk_ch) and discards sk_ch and u'. If Z is known beforehand, one simply computes the chameleon hash once and does not need to compute a collision. Clearly, the use of a chameleon hash allows to simply adapt to the actual set of signers representing Z without modifying c (with the knowledge of sk_ch - but it does not work without the knowledge of sk_ch). This would resolve the issue with the unknown Z at the time of signing.
> Also, A is committed in the signature, but not the concrete A'=\sum A_i of keys used for computing the signature (I guess also due to the reason that one does not know the correct set of signers when computing the hash c). That can be problematic in a rogue key scenario in the current protocol, i.e., when not all signers need to prove knowledge of the secret key when they register their public keys but their public keys could be functions of other public keys (guess this could be a problem here). For instance, a malicious A^* could just take some key from A, say A_j, and compute and publish A^*=a^*A_j. And then given a collective signature (R,s,Z) where A_j participated, the signer can update s to s^* = s+a^*c as well as Z^* to exclude A_j and include A^* (as Z is not committed in the signature generation) and the signature (R,s^*,Z^*) will be a valid signature that certifies that A^* participated in signing - although he didn't.
> If Z is committed as proposed above and it is checked during the verification, then this should no longer work. One could also adapt the hash c=H(R||pk_ch||CH(Z'||A)||S) to include a chameleon hash to CH(Z||A'), where A' is the real set of signers that participated in the signature generation and is adapted before finalizing the signature when known as above.
> I hope that what I proposed is not just complete nonsense :) Also it produces quite a bit of an overhead. There may also be easier ways to avoid the issues.
> Some editorial issues: the message to be signed is sometimes called a satement S and later then message msg. S could be confusing as part of the signature is s and your semantic is that scalars are lowercase and points are uppercase. Also in 4.2 "Signature Generation" steps 2 and 3 are confusing as I guess that in the protocol all the signer compute their own [r_i]B values and R=\sum R_i instead of R=[r]B which would mean that they would send their r_i's (hope they will not do so).
> Also I find it somewhat confusing that the bitmask Z identifies the non-signers with a bit set to 1. Why not identifying the signers with a bit set to 1?
> Cheers,
> Daniel
> [1] Hugo Krawczyk, Tal Rabin: Chameleon Signatures. NDSS 2000
> On 01.07.2017 23:58, Philipp Jovanovic wrote:
>> Hi CFRG,
>> Here’s a first version of an Internet-Draft on “Collective Edwards-Curve Digital Signature Algorithms” based on Ed25519 and Ed448:
>> We plan to give a short presentation on that topic at the next CFRG meeting in Prague.
>> Any feedback is more than welcome. Thanks!
>> All the best,
>> Philipp
>> _______________________________________________
>> Cfrg mailing list
> --
> Dr. Daniel Slamanig
> Institute for Applied Information Processing and Communications
> Graz University of Technology
> Inffeldgasse 16a, 8010 Graz, Austria.
> Phone: +43 316 873 5509
> _______________________________________________
> Cfrg mailing list