Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Double check adaptor implicit certificates #4

Open
burdges opened this issue Dec 24, 2018 · 4 comments
Open

Double check adaptor implicit certificates #4

burdges opened this issue Dec 24, 2018 · 4 comments

Comments

@burdges
Copy link
Collaborator

burdges commented Dec 24, 2018

We include an implicit certificate scheme similar to ECQV implicit certificates, as described in "Standards for efficient cryptography, SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV)".

We also hash the issuer's public key when creating the challenge e, mostly because it sounds wise, but also since that helped with the MQV vs HMQV issues. Ristretto handles most point validation issues here, but anything like the identity, etc. needs checking.

I'll read through the security proof somewhat closer eventually. See:

Daniel R. L. Brown, Robert P. Gallant, Scott A. Vanstone. "Provably Secure Implicit Certificate Schemes". Financial Cryptography 2001. Lecture Notes in Computer Science. Springer Berlin Heidelberg. 2339 (1): 156–165. doi:10.1007/3-540-46088-8_15.

@burdges burdges changed the title MQV vs HMQV ECQV Dec 24, 2018
@burdges burdges changed the title ECQV Double check ECQV Dec 24, 2018
@burdges
Copy link
Collaborator Author

burdges commented Dec 24, 2018

Also we need more tests if we're actually going to use these anywhere.

@burdges
Copy link
Collaborator Author

burdges commented Jul 4, 2019

I wonder if ring implicit certificates make sense.. I could imagine these being useful in peer-to-peer networking, if either schnorrkel were also being used for a key exchange at the transport layer, or else if we standardized a mapping from Ristretto to Ed25519. #38

@burdges
Copy link
Collaborator Author

burdges commented Jun 30, 2020

We killed ECQV in favor of an adaptor signature based implicit certificate scheme that can be abstracted better. We should still explore the MQV vs HMQV issues and do security arguments for this adaptor signature based implicit certificate scheme.

@burdges burdges changed the title Double check ECQV Double check adaptor implicit certificates Jun 30, 2020
@burdges burdges mentioned this issue Aug 6, 2020
@burdges
Copy link
Collaborator Author

burdges commented Mar 29, 2021

It's possible ECQV implicit certificates chain better than adaptor ones, not sure yet.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant