SlideShare a Scribd company logo
1 of 18
Digital signatures
IUB BD DHAKA
What is a digital signature
โ€ข A digital signature allows the holder of the secret key (the signing key)
to sign a document
โ€ข Everyone who knows the verification key can verify that the signature
is valid (correctness)
โ€ข No one can forge a signature even given the verification key even
though he is given a signature
Structure of digital signature
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜)
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘”
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
Structure of digital signature scheme (DSS)
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜)
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘”
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
โ€ข Correctness
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘š) = 1
โ€ข Unforgeability
โ€ข To be continued
DSS VS MAC
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜)
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘”
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ ๐‘˜
โ€ข ๐‘š๐‘Ž๐‘๐‘˜ ๐‘š โ†’ ๐‘ก
โ€ข v๐‘’๐‘Ÿ๐‘˜ ๐‘š, ๐‘ก โ†’ {0,1}
Mac forgery game
M โ† {}
๐‘šโ€ฒ
๐‘กโ€ฒ
k โˆˆ๐‘… 0,1 ๐‘ 
(๐‘š, ๐‘ก)
Wins if
โ€ข ๐‘š โˆ‰ ๐‘€
โ€ข ๐‘ฃ๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ ๐‘š, ๐‘ก = 1
๐‘กโ€ฒ โ† ๐‘š๐‘Ž๐‘๐‘˜(๐‘šโ€ฒ)
M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times
as the adversary wants
Signature forgery game
M โ† {}
๐‘šโ€ฒ
๐‘ ๐‘–๐‘”โ€ฒ
๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘›(1๐‘ 
)
(๐‘š, ๐‘ ๐‘–๐‘”)
Wins if
โ€ข ๐‘š โˆ‰ ๐‘€
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” = 1
๐‘ ๐‘–๐‘”โ€ฒ โ† ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘šโ€ฒ)
M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times
as the adversary wants
๐‘ฃ๐‘˜
Definition of signature scheme
โ€ข Correctness:
โ€ข Pr ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = 1 ๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘› 1๐‘  = 1
โ€ข Unforgeability
โ€ข For all PPT adversary ๐ด, there exists negligible function ๐œ‡,
โ€ข Pr ๐ด ๐‘ค๐‘–๐‘›๐‘  ๐‘กโ„Ž๐‘’ ๐‘ ๐‘–๐‘”๐‘›๐‘Ž๐‘ก๐‘ข๐‘Ÿ๐‘’ ๐‘“๐‘œ๐‘Ÿ๐‘”๐‘’๐‘Ÿ๐‘ฆ ๐‘”๐‘Ž๐‘š๐‘’ โ‰ค ๐œ‡(๐‘›)
Relation between macs and signatures
โ€ข Every signature scheme is a message authentication code.
โ€ข A mac scheme is not necessarily a signature.
โ€ข Without the key, it may be impossible to verify a mac.
Signatures are expensive
โ€ข They require public-key operations for each signature you wish to do.
โ€ข Hash functions are relatively cheap
Hash and sign
โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a
collision resistant hash function, then the following
โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” ๐บ๐‘’๐‘›โ€ฒ 1๐‘ 
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜
โ€ฒ
(๐ป ๐‘š )
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜
โ€ฒ
๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1
Security of hash and sign
โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a collision resistant hash function, then the
following
โ€ข ๐บ๐‘’๐‘› 1๐‘ 
โ‰” ๐บ๐‘’๐‘›โ€ฒ
1๐‘ 
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜
โ€ฒ
(๐ป ๐‘š )
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ
๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1
โ€ข Essentially the same proof as hash and mac
โ€ข Breaking security of this scheme means
โ€ข Finding a collision
โ€ข Finding a signature on an unsigned message
Interesting property of plaintext RSA
โ€ข ๐‘ ๐‘˜, ๐‘๐‘˜ โ† ๐พ๐‘’๐‘ฆ๐บ๐‘’๐‘› 1๐‘  โ‡’ ๐ธ๐‘›๐‘๐‘๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š
โ€ข Due to the fact that ๐‘š๐‘’ ๐‘‘ = ๐‘š๐‘‘ ๐‘’
= ๐‘š๐‘’๐‘‘
RSA signature scheme
โ€ข Let (๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘›, ๐ธ๐‘›๐‘, ๐ท๐‘’๐‘) denote the RSA encryption scheme
โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” {๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ, ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  }
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐‘ ๐‘–๐‘” = ๐‘š
Insecure RSA signature scheme
โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  }
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š
โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š๐‘‘ ๐‘’
= ๐‘š๐‘’โ‹…๐‘‘ = ๐‘š
Secure RSA signature scheme
โ€ข Assumptions
โ€ข Random oracle ๐ป (Hash function modeled as a random oracle
โ€ข ๐‘› = ๐‘๐‘ž where ๐‘, ๐‘ž are prime
โ€ข ๐บ๐‘’๐‘› 1๐‘ 
โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ
, ๐‘๐‘˜โ€ฒ
โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘ 
}
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š)
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ป ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š)
โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) = (๐ป(๐‘š))๐‘‘ ๐‘’
๐‘š๐‘œ๐‘‘ ๐‘›
โ€ข (๐ป(๐‘š))๐‘‘ ๐‘’
๐‘š๐‘œ๐‘‘ ๐‘› = ๐ป(๐‘š)๐‘’โ‹…๐‘‘ ๐‘š๐‘œ๐‘‘ ๐œ™(๐‘›)
(๐‘š๐‘œ๐‘‘ ๐‘›) = ๐ป(๐‘š)
Schnorr signature scheme
โ€ข Based on
โ€ข Group G
โ€ข Generator ๐‘” for G
โ€ข Random oracle ๐ป
โ€ข Discrete logarithm
Schnorr signature scheme
โ€ข Requirement: Group ๐บ, ๐บ = ๐‘ž, generator ๐‘”, random oracle ๐ป
โ€ข ๐บ๐‘’๐‘› 1๐‘ 
โ€ข ๐‘ ๐‘˜ โˆˆ๐‘… ๐บ
โ€ข ๐‘ฃ๐‘˜ โ† ๐‘”๐‘ ๐‘˜
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜(๐‘š, ๐‘ ๐‘–๐‘”)
โ€ข ๐‘Ž, ๐‘  โ† ๐‘ ๐‘–๐‘”
โ€ข u โ† ๐‘”๐‘  โ‹… ๐‘ฃ๐‘˜โˆ’๐‘Ž
โ€ข Output ๐ป ๐‘ข, ๐‘š = ๐‘Ž
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š
โ€ข ๐‘ โˆˆ๐‘… ๐‘|๐บ|
โ€ข ๐‘ข โ† ๐‘”๐‘
โ€ข ๐‘Ž โ† ๐ป(๐‘ข, ๐‘š)
โ€ข ๐‘  โ† ๐‘Ž โ‹… ๐‘ ๐‘˜ + ๐‘ (๐‘š๐‘œ๐‘‘ ๐‘ž)
โ€ข Output (๐‘Ž, ๐‘ )

More Related Content

Similar to digital signatures1.pptx

ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11MITSUNARI Shigeo
ย 
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–MITSUNARI Shigeo
ย 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionPeter Waher
ย 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKIRabei Hassan
ย 
apidays LIVE Australia - WT* is JWT? by Maciej Treder
apidays LIVE Australia -  WT* is JWT? by Maciej Trederapidays LIVE Australia -  WT* is JWT? by Maciej Treder
apidays LIVE Australia - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Trederapidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Trederapidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE New York - WT* is JWT? by Maciej Treder
apidays LIVE New York -  WT* is JWT? by Maciej Trederapidays LIVE New York -  WT* is JWT? by Maciej Treder
apidays LIVE New York - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Trederapidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Trederapidays
ย 
Hash functions
Hash functionsHash functions
Hash functionssameezahur
ย 
Face verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creationFace verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creationDeep Learning Italia
ย 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynoteKaya Ota
ย 
Predicate-Preserving Collision-Resistant Hashing
Predicate-Preserving  Collision-Resistant HashingPredicate-Preserving  Collision-Resistant Hashing
Predicate-Preserving Collision-Resistant HashingPhilippe Camacho, Ph.D.
ย 

Similar to digital signatures1.pptx (14)

ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ย 
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
ย 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
ย 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to Encryption
ย 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
ย 
apidays LIVE Australia - WT* is JWT? by Maciej Treder
apidays LIVE Australia -  WT* is JWT? by Maciej Trederapidays LIVE Australia -  WT* is JWT? by Maciej Treder
apidays LIVE Australia - WT* is JWT? by Maciej Treder
ย 
apidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Trederapidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Treder
ย 
apidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Trederapidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
ย 
apidays LIVE New York - WT* is JWT? by Maciej Treder
apidays LIVE New York -  WT* is JWT? by Maciej Trederapidays LIVE New York -  WT* is JWT? by Maciej Treder
apidays LIVE New York - WT* is JWT? by Maciej Treder
ย 
apidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Trederapidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Treder
ย 
Hash functions
Hash functionsHash functions
Hash functions
ย 
Face verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creationFace verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creation
ย 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynote
ย 
Predicate-Preserving Collision-Resistant Hashing
Predicate-Preserving  Collision-Resistant HashingPredicate-Preserving  Collision-Resistant Hashing
Predicate-Preserving Collision-Resistant Hashing
ย 

More from AliAshraf68199

What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
ย 
WindowsRegistry.ppt
WindowsRegistry.pptWindowsRegistry.ppt
WindowsRegistry.pptAliAshraf68199
ย 
digital signatures10.pptx
digital signatures10.pptxdigital signatures10.pptx
digital signatures10.pptxAliAshraf68199
ย 
digital signatures.pptx
digital signatures.pptxdigital signatures.pptx
digital signatures.pptxAliAshraf68199
ย 
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptxlecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptxAliAshraf68199
ย 

More from AliAshraf68199 (6)

What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
ย 
Week1_2.ppt
Week1_2.pptWeek1_2.ppt
Week1_2.ppt
ย 
WindowsRegistry.ppt
WindowsRegistry.pptWindowsRegistry.ppt
WindowsRegistry.ppt
ย 
digital signatures10.pptx
digital signatures10.pptxdigital signatures10.pptx
digital signatures10.pptx
ย 
digital signatures.pptx
digital signatures.pptxdigital signatures.pptx
digital signatures.pptx
ย 
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptxlecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
ย 

Recently uploaded

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
ย 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
ย 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
ย 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
ย 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
ย 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
ย 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
ย 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
ย 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
ย 
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Call Girls in Nagpur High Profile
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
ย 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
ย 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
ย 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
ย 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
ย 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
ย 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
ย 

Recently uploaded (20)

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ย 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
ย 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
ย 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ย 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
ย 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
ย 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ย 
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ย 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
ย 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
ย 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ย 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ย 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
ย 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
ย 

digital signatures1.pptx

  • 2. What is a digital signature โ€ข A digital signature allows the holder of the secret key (the signing key) to sign a document โ€ข Everyone who knows the verification key can verify that the signature is valid (correctness) โ€ข No one can forge a signature even given the verification key even though he is given a signature
  • 3. Structure of digital signature โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜) โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘” โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
  • 4. Structure of digital signature scheme (DSS) โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜) โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘” โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1} โ€ข Correctness โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘š) = 1 โ€ข Unforgeability โ€ข To be continued
  • 5. DSS VS MAC โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜) โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘” โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1} โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ ๐‘˜ โ€ข ๐‘š๐‘Ž๐‘๐‘˜ ๐‘š โ†’ ๐‘ก โ€ข v๐‘’๐‘Ÿ๐‘˜ ๐‘š, ๐‘ก โ†’ {0,1}
  • 6. Mac forgery game M โ† {} ๐‘šโ€ฒ ๐‘กโ€ฒ k โˆˆ๐‘… 0,1 ๐‘  (๐‘š, ๐‘ก) Wins if โ€ข ๐‘š โˆ‰ ๐‘€ โ€ข ๐‘ฃ๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ ๐‘š, ๐‘ก = 1 ๐‘กโ€ฒ โ† ๐‘š๐‘Ž๐‘๐‘˜(๐‘šโ€ฒ) M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times as the adversary wants
  • 7. Signature forgery game M โ† {} ๐‘šโ€ฒ ๐‘ ๐‘–๐‘”โ€ฒ ๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘›(1๐‘  ) (๐‘š, ๐‘ ๐‘–๐‘”) Wins if โ€ข ๐‘š โˆ‰ ๐‘€ โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” = 1 ๐‘ ๐‘–๐‘”โ€ฒ โ† ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘šโ€ฒ) M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times as the adversary wants ๐‘ฃ๐‘˜
  • 8. Definition of signature scheme โ€ข Correctness: โ€ข Pr ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = 1 ๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘› 1๐‘  = 1 โ€ข Unforgeability โ€ข For all PPT adversary ๐ด, there exists negligible function ๐œ‡, โ€ข Pr ๐ด ๐‘ค๐‘–๐‘›๐‘  ๐‘กโ„Ž๐‘’ ๐‘ ๐‘–๐‘”๐‘›๐‘Ž๐‘ก๐‘ข๐‘Ÿ๐‘’ ๐‘“๐‘œ๐‘Ÿ๐‘”๐‘’๐‘Ÿ๐‘ฆ ๐‘”๐‘Ž๐‘š๐‘’ โ‰ค ๐œ‡(๐‘›)
  • 9. Relation between macs and signatures โ€ข Every signature scheme is a message authentication code. โ€ข A mac scheme is not necessarily a signature. โ€ข Without the key, it may be impossible to verify a mac.
  • 10. Signatures are expensive โ€ข They require public-key operations for each signature you wish to do. โ€ข Hash functions are relatively cheap
  • 11. Hash and sign โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a collision resistant hash function, then the following โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” ๐บ๐‘’๐‘›โ€ฒ 1๐‘  โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ โ€ฒ (๐ป ๐‘š ) โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ โ€ฒ ๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1
  • 12. Security of hash and sign โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a collision resistant hash function, then the following โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” ๐บ๐‘’๐‘›โ€ฒ 1๐‘  โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ โ€ฒ (๐ป ๐‘š ) โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ ๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1 โ€ข Essentially the same proof as hash and mac โ€ข Breaking security of this scheme means โ€ข Finding a collision โ€ข Finding a signature on an unsigned message
  • 13. Interesting property of plaintext RSA โ€ข ๐‘ ๐‘˜, ๐‘๐‘˜ โ† ๐พ๐‘’๐‘ฆ๐บ๐‘’๐‘› 1๐‘  โ‡’ ๐ธ๐‘›๐‘๐‘๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š โ€ข Due to the fact that ๐‘š๐‘’ ๐‘‘ = ๐‘š๐‘‘ ๐‘’ = ๐‘š๐‘’๐‘‘
  • 14. RSA signature scheme โ€ข Let (๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘›, ๐ธ๐‘›๐‘, ๐ท๐‘’๐‘) denote the RSA encryption scheme โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” {๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ, ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  } โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐‘ ๐‘–๐‘” = ๐‘š
  • 15. Insecure RSA signature scheme โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  } โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š๐‘‘ ๐‘’ = ๐‘š๐‘’โ‹…๐‘‘ = ๐‘š
  • 16. Secure RSA signature scheme โ€ข Assumptions โ€ข Random oracle ๐ป (Hash function modeled as a random oracle โ€ข ๐‘› = ๐‘๐‘ž where ๐‘, ๐‘ž are prime โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ , ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  } โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ป ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) = (๐ป(๐‘š))๐‘‘ ๐‘’ ๐‘š๐‘œ๐‘‘ ๐‘› โ€ข (๐ป(๐‘š))๐‘‘ ๐‘’ ๐‘š๐‘œ๐‘‘ ๐‘› = ๐ป(๐‘š)๐‘’โ‹…๐‘‘ ๐‘š๐‘œ๐‘‘ ๐œ™(๐‘›) (๐‘š๐‘œ๐‘‘ ๐‘›) = ๐ป(๐‘š)
  • 17. Schnorr signature scheme โ€ข Based on โ€ข Group G โ€ข Generator ๐‘” for G โ€ข Random oracle ๐ป โ€ข Discrete logarithm
  • 18. Schnorr signature scheme โ€ข Requirement: Group ๐บ, ๐บ = ๐‘ž, generator ๐‘”, random oracle ๐ป โ€ข ๐บ๐‘’๐‘› 1๐‘  โ€ข ๐‘ ๐‘˜ โˆˆ๐‘… ๐บ โ€ข ๐‘ฃ๐‘˜ โ† ๐‘”๐‘ ๐‘˜ โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜(๐‘š, ๐‘ ๐‘–๐‘”) โ€ข ๐‘Ž, ๐‘  โ† ๐‘ ๐‘–๐‘” โ€ข u โ† ๐‘”๐‘  โ‹… ๐‘ฃ๐‘˜โˆ’๐‘Ž โ€ข Output ๐ป ๐‘ข, ๐‘š = ๐‘Ž โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ€ข ๐‘ โˆˆ๐‘… ๐‘|๐บ| โ€ข ๐‘ข โ† ๐‘”๐‘ โ€ข ๐‘Ž โ† ๐ป(๐‘ข, ๐‘š) โ€ข ๐‘  โ† ๐‘Ž โ‹… ๐‘ ๐‘˜ + ๐‘ (๐‘š๐‘œ๐‘‘ ๐‘ž) โ€ข Output (๐‘Ž, ๐‘ )