SlideShare a Scribd company logo
1 of 18
bangladesh
What is a digital signature
โ€ข A digital signature allows the holder of the secret key (the signing key)
to sign a document
โ€ข Everyone who knows the verification key can verify that the signature
is valid (correctness)
โ€ข No one can forge a signature even given the verification key even
though he is given a signature
Structure of digital signature
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜)
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘”
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
Structure of digital signature scheme (DSS)
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜)
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘”
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
โ€ข Correctness
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘š) = 1
โ€ข Unforgeability
โ€ข To be continued
DSS VS MAC
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜)
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘”
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ ๐‘˜
โ€ข ๐‘š๐‘Ž๐‘๐‘˜ ๐‘š โ†’ ๐‘ก
โ€ข v๐‘’๐‘Ÿ๐‘˜ ๐‘š, ๐‘ก โ†’ {0,1}
Mac forgery game
M โ† {}
๐‘šโ€ฒ
๐‘กโ€ฒ
k โˆˆ๐‘… 0,1 ๐‘ 
(๐‘š, ๐‘ก)
Wins if
โ€ข ๐‘š โˆ‰ ๐‘€
โ€ข ๐‘ฃ๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ ๐‘š, ๐‘ก = 1
๐‘กโ€ฒ โ† ๐‘š๐‘Ž๐‘๐‘˜(๐‘šโ€ฒ)
M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times
as the adversary wants
Signature forgery game
M โ† {}
๐‘šโ€ฒ
๐‘ ๐‘–๐‘”โ€ฒ
๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘›(1๐‘ 
)
(๐‘š, ๐‘ ๐‘–๐‘”)
Wins if
โ€ข ๐‘š โˆ‰ ๐‘€
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” = 1
๐‘ ๐‘–๐‘”โ€ฒ โ† ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘šโ€ฒ)
M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times
as the adversary wants
๐‘ฃ๐‘˜
Definition of signature scheme
โ€ข Correctness:
โ€ข Pr ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = 1 ๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘› 1๐‘  = 1
โ€ข Unforgeability
โ€ข For all PPT adversary ๐ด, there exists negligible function ๐œ‡,
โ€ข Pr ๐ด ๐‘ค๐‘–๐‘›๐‘  ๐‘กโ„Ž๐‘’ ๐‘ ๐‘–๐‘”๐‘›๐‘Ž๐‘ก๐‘ข๐‘Ÿ๐‘’ ๐‘“๐‘œ๐‘Ÿ๐‘”๐‘’๐‘Ÿ๐‘ฆ ๐‘”๐‘Ž๐‘š๐‘’ โ‰ค ๐œ‡(๐‘›)
Relation between macs and signatures
โ€ข Every signature scheme is a message authentication code.
โ€ข A mac scheme is not necessarily a signature.
โ€ข Without the key, it may be impossible to verify a mac.
Signatures are expensive
โ€ข They require public-key operations for each signature you wish to do.
โ€ข Hash functions are relatively cheap
Hash and sign
โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a
collision resistant hash function, then the following
โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” ๐บ๐‘’๐‘›โ€ฒ 1๐‘ 
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜
โ€ฒ
(๐ป ๐‘š )
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜
โ€ฒ
๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1
Security of hash and sign
โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a collision resistant hash function, then the
following
โ€ข ๐บ๐‘’๐‘› 1๐‘ 
โ‰” ๐บ๐‘’๐‘›โ€ฒ
1๐‘ 
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜
โ€ฒ
(๐ป ๐‘š )
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ
๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1
โ€ข Essentially the same proof as hash and mac
โ€ข Breaking security of this scheme means
โ€ข Finding a collision
โ€ข Finding a signature on an unsigned message
Interesting property of plaintext RSA
โ€ข ๐‘ ๐‘˜, ๐‘๐‘˜ โ† ๐พ๐‘’๐‘ฆ๐บ๐‘’๐‘› 1๐‘  โ‡’ ๐ธ๐‘›๐‘๐‘๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š
โ€ข Due to the fact that ๐‘š๐‘’ ๐‘‘ = ๐‘š๐‘‘ ๐‘’
= ๐‘š๐‘’๐‘‘
RSA signature scheme
โ€ข Let (๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘›, ๐ธ๐‘›๐‘, ๐ท๐‘’๐‘) denote the RSA encryption scheme
โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” {๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ, ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  }
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐‘ ๐‘–๐‘” = ๐‘š
Insecure RSA signature scheme
โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  }
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š
โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š๐‘‘ ๐‘’
= ๐‘š๐‘’โ‹…๐‘‘ = ๐‘š
Secure RSA signature scheme
โ€ข Assumptions
โ€ข Random oracle ๐ป (Hash function modeled as a random oracle
โ€ข ๐‘› = ๐‘๐‘ž where ๐‘, ๐‘ž are prime
โ€ข ๐บ๐‘’๐‘› 1๐‘ 
โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ
, ๐‘๐‘˜โ€ฒ
โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘ 
}
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š)
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ป ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š)
โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) = (๐ป(๐‘š))๐‘‘ ๐‘’
๐‘š๐‘œ๐‘‘ ๐‘›
โ€ข (๐ป(๐‘š))๐‘‘ ๐‘’
๐‘š๐‘œ๐‘‘ ๐‘› = ๐ป(๐‘š)๐‘’โ‹…๐‘‘ ๐‘š๐‘œ๐‘‘ ๐œ™(๐‘›)
(๐‘š๐‘œ๐‘‘ ๐‘›) = ๐ป(๐‘š)
Schnorr signature scheme
โ€ข Based on
โ€ข Group G
โ€ข Generator ๐‘” for G
โ€ข Random oracle ๐ป
โ€ข Discrete logarithm
Schnorr signature scheme
โ€ข Requirement: Group ๐บ, ๐บ = ๐‘ž, generator ๐‘”, random oracle ๐ป
โ€ข ๐บ๐‘’๐‘› 1๐‘ 
โ€ข ๐‘ ๐‘˜ โˆˆ๐‘… ๐บ
โ€ข ๐‘ฃ๐‘˜ โ† ๐‘”๐‘ ๐‘˜
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜(๐‘š, ๐‘ ๐‘–๐‘”)
โ€ข ๐‘Ž, ๐‘  โ† ๐‘ ๐‘–๐‘”
โ€ข u โ† ๐‘”๐‘  โ‹… ๐‘ฃ๐‘˜โˆ’๐‘Ž
โ€ข Output ๐ป ๐‘ข, ๐‘š = ๐‘Ž
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š
โ€ข ๐‘ โˆˆ๐‘… ๐‘|๐บ|
โ€ข ๐‘ข โ† ๐‘”๐‘
โ€ข ๐‘Ž โ† ๐ป(๐‘ข, ๐‘š)
โ€ข ๐‘  โ† ๐‘Ž โ‹… ๐‘ ๐‘˜ + ๐‘ (๐‘š๐‘œ๐‘‘ ๐‘ž)
โ€ข Output (๐‘Ž, ๐‘ )

More Related Content

Similar to What is a digital signature - Key aspects and common schemes explained

[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...
[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...
[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...PROIDEA
ย 
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–MITSUNARI Shigeo
ย 
ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11MITSUNARI Shigeo
ย 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKIRabei Hassan
ย 
apidays LIVE Australia 2020 - WT* is JWT? by Maciej Treder
apidays LIVE Australia 2020 -  WT* is JWT? by Maciej Trederapidays LIVE Australia 2020 -  WT* is JWT? by Maciej Treder
apidays LIVE Australia 2020 - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Trederapidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Trederapidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE New York - WT* is JWT? by Maciej Treder
apidays LIVE New York -  WT* is JWT? by Maciej Trederapidays LIVE New York -  WT* is JWT? by Maciej Treder
apidays LIVE New York - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Trederapidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Trederapidays
ย 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionPeter Waher
ย 
Face verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creationFace verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creationDeep Learning Italia
ย 
Hash functions
Hash functionsHash functions
Hash functionssameezahur
ย 

Similar to What is a digital signature - Key aspects and common schemes explained (13)

[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...
[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...
[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...
ย 
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
ย 
ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ย 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
ย 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
ย 
apidays LIVE Australia 2020 - WT* is JWT? by Maciej Treder
apidays LIVE Australia 2020 -  WT* is JWT? by Maciej Trederapidays LIVE Australia 2020 -  WT* is JWT? by Maciej Treder
apidays LIVE Australia 2020 - WT* is JWT? by Maciej Treder
ย 
apidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Trederapidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Treder
ย 
apidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Trederapidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
ย 
apidays LIVE New York - WT* is JWT? by Maciej Treder
apidays LIVE New York -  WT* is JWT? by Maciej Trederapidays LIVE New York -  WT* is JWT? by Maciej Treder
apidays LIVE New York - WT* is JWT? by Maciej Treder
ย 
apidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Trederapidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Treder
ย 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to Encryption
ย 
Face verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creationFace verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creation
ย 
Hash functions
Hash functionsHash functions
Hash functions
ย 

Recently uploaded

Vip Model Call Girls (Delhi) Karol Bagh 9711199171โœ”๏ธBody to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171โœ”๏ธBody to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171โœ”๏ธBody to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171โœ”๏ธBody to body massage wit...shivangimorya083
ย 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
ย 
Call Girls in Sarai Kale Khan Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escorts S...Delhi Call girls
ย 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
ย 
Chintamani Call Girls: ๐Ÿ“ 7737669865 ๐Ÿ“ High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: ๐Ÿ“ 7737669865 ๐Ÿ“ High Profile Model Escorts | Bangalore ...Chintamani Call Girls: ๐Ÿ“ 7737669865 ๐Ÿ“ High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: ๐Ÿ“ 7737669865 ๐Ÿ“ High Profile Model Escorts | Bangalore ...amitlee9823
ย 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
ย 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
ย 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
ย 
CHEAP Call Girls in Saket (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
ย 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
ย 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
ย 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
ย 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
ย 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
ย 
BDSMโšกCall Girls in Mandawali Delhi >เผ’8448380779 Escort Service
BDSMโšกCall Girls in Mandawali Delhi >เผ’8448380779 Escort ServiceBDSMโšกCall Girls in Mandawali Delhi >เผ’8448380779 Escort Service
BDSMโšกCall Girls in Mandawali Delhi >เผ’8448380779 Escort ServiceDelhi Call girls
ย 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
ย 
Call Girls Indiranagar Just Call ๐Ÿ‘— 7737669865 ๐Ÿ‘— Top Class Call Girl Service B...
Call Girls Indiranagar Just Call ๐Ÿ‘— 7737669865 ๐Ÿ‘— Top Class Call Girl Service B...Call Girls Indiranagar Just Call ๐Ÿ‘— 7737669865 ๐Ÿ‘— Top Class Call Girl Service B...
Call Girls Indiranagar Just Call ๐Ÿ‘— 7737669865 ๐Ÿ‘— Top Class Call Girl Service B...amitlee9823
ย 

Recently uploaded (20)

Vip Model Call Girls (Delhi) Karol Bagh 9711199171โœ”๏ธBody to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171โœ”๏ธBody to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171โœ”๏ธBody to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171โœ”๏ธBody to body massage wit...
ย 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
ย 
Call Girls in Sarai Kale Khan Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escorts S...
ย 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
ย 
Chintamani Call Girls: ๐Ÿ“ 7737669865 ๐Ÿ“ High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: ๐Ÿ“ 7737669865 ๐Ÿ“ High Profile Model Escorts | Bangalore ...Chintamani Call Girls: ๐Ÿ“ 7737669865 ๐Ÿ“ High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: ๐Ÿ“ 7737669865 ๐Ÿ“ High Profile Model Escorts | Bangalore ...
ย 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
ย 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
ย 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
ย 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
ย 
CHEAP Call Girls in Saket (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
ย 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
ย 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
ย 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
ย 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
ย 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
ย 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
ย 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
ย 
BDSMโšกCall Girls in Mandawali Delhi >เผ’8448380779 Escort Service
BDSMโšกCall Girls in Mandawali Delhi >เผ’8448380779 Escort ServiceBDSMโšกCall Girls in Mandawali Delhi >เผ’8448380779 Escort Service
BDSMโšกCall Girls in Mandawali Delhi >เผ’8448380779 Escort Service
ย 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
ย 
Call Girls Indiranagar Just Call ๐Ÿ‘— 7737669865 ๐Ÿ‘— Top Class Call Girl Service B...
Call Girls Indiranagar Just Call ๐Ÿ‘— 7737669865 ๐Ÿ‘— Top Class Call Girl Service B...Call Girls Indiranagar Just Call ๐Ÿ‘— 7737669865 ๐Ÿ‘— Top Class Call Girl Service B...
Call Girls Indiranagar Just Call ๐Ÿ‘— 7737669865 ๐Ÿ‘— Top Class Call Girl Service B...
ย 

What is a digital signature - Key aspects and common schemes explained

  • 2. What is a digital signature โ€ข A digital signature allows the holder of the secret key (the signing key) to sign a document โ€ข Everyone who knows the verification key can verify that the signature is valid (correctness) โ€ข No one can forge a signature even given the verification key even though he is given a signature
  • 3. Structure of digital signature โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜) โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘” โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
  • 4. Structure of digital signature scheme (DSS) โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜) โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘” โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1} โ€ข Correctness โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘š) = 1 โ€ข Unforgeability โ€ข To be continued
  • 5. DSS VS MAC โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜) โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘” โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1} โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ ๐‘˜ โ€ข ๐‘š๐‘Ž๐‘๐‘˜ ๐‘š โ†’ ๐‘ก โ€ข v๐‘’๐‘Ÿ๐‘˜ ๐‘š, ๐‘ก โ†’ {0,1}
  • 6. Mac forgery game M โ† {} ๐‘šโ€ฒ ๐‘กโ€ฒ k โˆˆ๐‘… 0,1 ๐‘  (๐‘š, ๐‘ก) Wins if โ€ข ๐‘š โˆ‰ ๐‘€ โ€ข ๐‘ฃ๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ ๐‘š, ๐‘ก = 1 ๐‘กโ€ฒ โ† ๐‘š๐‘Ž๐‘๐‘˜(๐‘šโ€ฒ) M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times as the adversary wants
  • 7. Signature forgery game M โ† {} ๐‘šโ€ฒ ๐‘ ๐‘–๐‘”โ€ฒ ๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘›(1๐‘  ) (๐‘š, ๐‘ ๐‘–๐‘”) Wins if โ€ข ๐‘š โˆ‰ ๐‘€ โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” = 1 ๐‘ ๐‘–๐‘”โ€ฒ โ† ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘šโ€ฒ) M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times as the adversary wants ๐‘ฃ๐‘˜
  • 8. Definition of signature scheme โ€ข Correctness: โ€ข Pr ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = 1 ๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘› 1๐‘  = 1 โ€ข Unforgeability โ€ข For all PPT adversary ๐ด, there exists negligible function ๐œ‡, โ€ข Pr ๐ด ๐‘ค๐‘–๐‘›๐‘  ๐‘กโ„Ž๐‘’ ๐‘ ๐‘–๐‘”๐‘›๐‘Ž๐‘ก๐‘ข๐‘Ÿ๐‘’ ๐‘“๐‘œ๐‘Ÿ๐‘”๐‘’๐‘Ÿ๐‘ฆ ๐‘”๐‘Ž๐‘š๐‘’ โ‰ค ๐œ‡(๐‘›)
  • 9. Relation between macs and signatures โ€ข Every signature scheme is a message authentication code. โ€ข A mac scheme is not necessarily a signature. โ€ข Without the key, it may be impossible to verify a mac.
  • 10. Signatures are expensive โ€ข They require public-key operations for each signature you wish to do. โ€ข Hash functions are relatively cheap
  • 11. Hash and sign โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a collision resistant hash function, then the following โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” ๐บ๐‘’๐‘›โ€ฒ 1๐‘  โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ โ€ฒ (๐ป ๐‘š ) โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ โ€ฒ ๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1
  • 12. Security of hash and sign โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a collision resistant hash function, then the following โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” ๐บ๐‘’๐‘›โ€ฒ 1๐‘  โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ โ€ฒ (๐ป ๐‘š ) โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ ๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1 โ€ข Essentially the same proof as hash and mac โ€ข Breaking security of this scheme means โ€ข Finding a collision โ€ข Finding a signature on an unsigned message
  • 13. Interesting property of plaintext RSA โ€ข ๐‘ ๐‘˜, ๐‘๐‘˜ โ† ๐พ๐‘’๐‘ฆ๐บ๐‘’๐‘› 1๐‘  โ‡’ ๐ธ๐‘›๐‘๐‘๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š โ€ข Due to the fact that ๐‘š๐‘’ ๐‘‘ = ๐‘š๐‘‘ ๐‘’ = ๐‘š๐‘’๐‘‘
  • 14. RSA signature scheme โ€ข Let (๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘›, ๐ธ๐‘›๐‘, ๐ท๐‘’๐‘) denote the RSA encryption scheme โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” {๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ, ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  } โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐‘ ๐‘–๐‘” = ๐‘š
  • 15. Insecure RSA signature scheme โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  } โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š๐‘‘ ๐‘’ = ๐‘š๐‘’โ‹…๐‘‘ = ๐‘š
  • 16. Secure RSA signature scheme โ€ข Assumptions โ€ข Random oracle ๐ป (Hash function modeled as a random oracle โ€ข ๐‘› = ๐‘๐‘ž where ๐‘, ๐‘ž are prime โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ , ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  } โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ป ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) = (๐ป(๐‘š))๐‘‘ ๐‘’ ๐‘š๐‘œ๐‘‘ ๐‘› โ€ข (๐ป(๐‘š))๐‘‘ ๐‘’ ๐‘š๐‘œ๐‘‘ ๐‘› = ๐ป(๐‘š)๐‘’โ‹…๐‘‘ ๐‘š๐‘œ๐‘‘ ๐œ™(๐‘›) (๐‘š๐‘œ๐‘‘ ๐‘›) = ๐ป(๐‘š)
  • 17. Schnorr signature scheme โ€ข Based on โ€ข Group G โ€ข Generator ๐‘” for G โ€ข Random oracle ๐ป โ€ข Discrete logarithm
  • 18. Schnorr signature scheme โ€ข Requirement: Group ๐บ, ๐บ = ๐‘ž, generator ๐‘”, random oracle ๐ป โ€ข ๐บ๐‘’๐‘› 1๐‘  โ€ข ๐‘ ๐‘˜ โˆˆ๐‘… ๐บ โ€ข ๐‘ฃ๐‘˜ โ† ๐‘”๐‘ ๐‘˜ โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜(๐‘š, ๐‘ ๐‘–๐‘”) โ€ข ๐‘Ž, ๐‘  โ† ๐‘ ๐‘–๐‘” โ€ข u โ† ๐‘”๐‘  โ‹… ๐‘ฃ๐‘˜โˆ’๐‘Ž โ€ข Output ๐ป ๐‘ข, ๐‘š = ๐‘Ž โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ€ข ๐‘ โˆˆ๐‘… ๐‘|๐บ| โ€ข ๐‘ข โ† ๐‘”๐‘ โ€ข ๐‘Ž โ† ๐ป(๐‘ข, ๐‘š) โ€ข ๐‘  โ† ๐‘Ž โ‹… ๐‘ ๐‘˜ + ๐‘ (๐‘š๐‘œ๐‘‘ ๐‘ž) โ€ข Output (๐‘Ž, ๐‘ )