SlideShare a Scribd company logo
1 of 18
Digital signatures
IUB
What is a digital signature
โ€ข A digital signature allows the holder of the secret key (the signing key)
to sign a document
โ€ข Everyone who knows the verification key can verify that the signature
is valid (correctness)
โ€ข No one can forge a signature even given the verification key even
though he is given a signature
Structure of digital signature
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜)
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘”
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
Structure of digital signature scheme (DSS)
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜)
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘”
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
โ€ข Correctness
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘š) = 1
โ€ข Unforgeability
โ€ข To be continued
DSS VS MAC
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜)
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘”
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ ๐‘˜
โ€ข ๐‘š๐‘Ž๐‘๐‘˜ ๐‘š โ†’ ๐‘ก
โ€ข v๐‘’๐‘Ÿ๐‘˜ ๐‘š, ๐‘ก โ†’ {0,1}
Mac forgery game
M โ† {}
๐‘šโ€ฒ
๐‘กโ€ฒ
k โˆˆ๐‘… 0,1 ๐‘ 
(๐‘š, ๐‘ก)
Wins if
โ€ข ๐‘š โˆ‰ ๐‘€
โ€ข ๐‘ฃ๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ ๐‘š, ๐‘ก = 1
๐‘กโ€ฒ โ† ๐‘š๐‘Ž๐‘๐‘˜(๐‘šโ€ฒ)
M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times
as the adversary wants
Signature forgery game
M โ† {}
๐‘šโ€ฒ
๐‘ ๐‘–๐‘”โ€ฒ
๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘›(1๐‘ 
)
(๐‘š, ๐‘ ๐‘–๐‘”)
Wins if
โ€ข ๐‘š โˆ‰ ๐‘€
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” = 1
๐‘ ๐‘–๐‘”โ€ฒ โ† ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘šโ€ฒ)
M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times
as the adversary wants
๐‘ฃ๐‘˜
Definition of signature scheme
โ€ข Correctness:
โ€ข Pr ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = 1 ๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘› 1๐‘  = 1
โ€ข Unforgeability
โ€ข For all PPT adversary ๐ด, there exists negligible function ๐œ‡,
โ€ข Pr ๐ด ๐‘ค๐‘–๐‘›๐‘  ๐‘กโ„Ž๐‘’ ๐‘ ๐‘–๐‘”๐‘›๐‘Ž๐‘ก๐‘ข๐‘Ÿ๐‘’ ๐‘“๐‘œ๐‘Ÿ๐‘”๐‘’๐‘Ÿ๐‘ฆ ๐‘”๐‘Ž๐‘š๐‘’ โ‰ค ๐œ‡(๐‘›)
Relation between macs and signatures
โ€ข Every signature scheme is a message authentication code.
โ€ข A mac scheme is not necessarily a signature.
โ€ข Without the key, it may be impossible to verify a mac.
Signatures are expensive
โ€ข They require public-key operations for each signature you wish to do.
โ€ข Hash functions are relatively cheap
Hash and sign
โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a
collision resistant hash function, then the following
โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” ๐บ๐‘’๐‘›โ€ฒ 1๐‘ 
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜
โ€ฒ
(๐ป ๐‘š )
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜
โ€ฒ
๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1
Security of hash and sign
โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a collision resistant hash function, then the
following
โ€ข ๐บ๐‘’๐‘› 1๐‘ 
โ‰” ๐บ๐‘’๐‘›โ€ฒ
1๐‘ 
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜
โ€ฒ
(๐ป ๐‘š )
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ
๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1
โ€ข Essentially the same proof as hash and mac
โ€ข Breaking security of this scheme means
โ€ข Finding a collision
โ€ข Finding a signature on an unsigned message
Interesting property of plaintext RSA
โ€ข ๐‘ ๐‘˜, ๐‘๐‘˜ โ† ๐พ๐‘’๐‘ฆ๐บ๐‘’๐‘› 1๐‘  โ‡’ ๐ธ๐‘›๐‘๐‘๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š
โ€ข Due to the fact that ๐‘š๐‘’ ๐‘‘ = ๐‘š๐‘‘ ๐‘’
= ๐‘š๐‘’๐‘‘
RSA signature scheme
โ€ข Let (๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘›, ๐ธ๐‘›๐‘, ๐ท๐‘’๐‘) denote the RSA encryption scheme
โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” {๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ, ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  }
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐‘ ๐‘–๐‘” = ๐‘š
Insecure RSA signature scheme
โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  }
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š
โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š๐‘‘ ๐‘’
= ๐‘š๐‘’โ‹…๐‘‘ = ๐‘š
Secure RSA signature scheme
โ€ข Assumptions
โ€ข Random oracle ๐ป (Hash function modeled as a random oracle
โ€ข ๐‘› = ๐‘๐‘ž where ๐‘, ๐‘ž are prime
โ€ข ๐บ๐‘’๐‘› 1๐‘ 
โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ
, ๐‘๐‘˜โ€ฒ
โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘ 
}
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š)
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ป ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š)
โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) = (๐ป(๐‘š))๐‘‘ ๐‘’
๐‘š๐‘œ๐‘‘ ๐‘›
โ€ข (๐ป(๐‘š))๐‘‘ ๐‘’
๐‘š๐‘œ๐‘‘ ๐‘› = ๐ป(๐‘š)๐‘’โ‹…๐‘‘ ๐‘š๐‘œ๐‘‘ ๐œ™(๐‘›)
(๐‘š๐‘œ๐‘‘ ๐‘›) = ๐ป(๐‘š)
Schnorr signature scheme
โ€ข Based on
โ€ข Group G
โ€ข Generator ๐‘” for G
โ€ข Random oracle ๐ป
โ€ข Discrete logarithm
Schnorr signature scheme
โ€ข Requirement: Group ๐บ, ๐บ = ๐‘ž, generator ๐‘”, random oracle ๐ป
โ€ข ๐บ๐‘’๐‘› 1๐‘ 
โ€ข ๐‘ ๐‘˜ โˆˆ๐‘… ๐บ
โ€ข ๐‘ฃ๐‘˜ โ† ๐‘”๐‘ ๐‘˜
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜(๐‘š, ๐‘ ๐‘–๐‘”)
โ€ข ๐‘Ž, ๐‘  โ† ๐‘ ๐‘–๐‘”
โ€ข u โ† ๐‘”๐‘  โ‹… ๐‘ฃ๐‘˜โˆ’๐‘Ž
โ€ข Output ๐ป ๐‘ข, ๐‘š = ๐‘Ž
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š
โ€ข ๐‘ โˆˆ๐‘… ๐‘|๐บ|
โ€ข ๐‘ข โ† ๐‘”๐‘
โ€ข ๐‘Ž โ† ๐ป(๐‘ข, ๐‘š)
โ€ข ๐‘  โ† ๐‘Ž โ‹… ๐‘ ๐‘˜ + ๐‘ (๐‘š๐‘œ๐‘‘ ๐‘ž)
โ€ข Output (๐‘Ž, ๐‘ )

More Related Content

Similar to Digital Signatures Explained in 40 Characters

[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...
[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...
[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...PROIDEA
ย 
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–MITSUNARI Shigeo
ย 
ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11MITSUNARI Shigeo
ย 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKIRabei Hassan
ย 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionPeter Waher
ย 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynoteKaya Ota
ย 
Hash functions
Hash functionsHash functions
Hash functionssameezahur
ย 
apidays LIVE Australia - WT* is JWT? by Maciej Treder
apidays LIVE Australia -  WT* is JWT? by Maciej Trederapidays LIVE Australia -  WT* is JWT? by Maciej Treder
apidays LIVE Australia - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Trederapidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Trederapidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE New York - WT* is JWT? by Maciej Treder
apidays LIVE New York -  WT* is JWT? by Maciej Trederapidays LIVE New York -  WT* is JWT? by Maciej Treder
apidays LIVE New York - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Trederapidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Trederapidays
ย 
Face verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creationFace verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creationDeep Learning Italia
ย 
Predicate-Preserving Collision-Resistant Hashing
Predicate-Preserving  Collision-Resistant HashingPredicate-Preserving  Collision-Resistant Hashing
Predicate-Preserving Collision-Resistant HashingPhilippe Camacho, Ph.D.
ย 

Similar to Digital Signatures Explained in 40 Characters (15)

[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...
[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...
[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...
ย 
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
ย 
ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ย 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
ย 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
ย 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to Encryption
ย 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynote
ย 
Hash functions
Hash functionsHash functions
Hash functions
ย 
apidays LIVE Australia - WT* is JWT? by Maciej Treder
apidays LIVE Australia -  WT* is JWT? by Maciej Trederapidays LIVE Australia -  WT* is JWT? by Maciej Treder
apidays LIVE Australia - WT* is JWT? by Maciej Treder
ย 
apidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Trederapidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Treder
ย 
apidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Trederapidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
ย 
apidays LIVE New York - WT* is JWT? by Maciej Treder
apidays LIVE New York -  WT* is JWT? by Maciej Trederapidays LIVE New York -  WT* is JWT? by Maciej Treder
apidays LIVE New York - WT* is JWT? by Maciej Treder
ย 
apidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Trederapidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Treder
ย 
Face verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creationFace verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creation
ย 
Predicate-Preserving Collision-Resistant Hashing
Predicate-Preserving  Collision-Resistant HashingPredicate-Preserving  Collision-Resistant Hashing
Predicate-Preserving Collision-Resistant Hashing
ย 

Recently uploaded

How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
ย 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
ย 
Low Rate Young Call Girls in Sector 63 Mamura Noida โœ”๏ธโ˜†9289244007โœ”๏ธโ˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida โœ”๏ธโ˜†9289244007โœ”๏ธโ˜† Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida โœ”๏ธโ˜†9289244007โœ”๏ธโ˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida โœ”๏ธโ˜†9289244007โœ”๏ธโ˜† Female E...SofiyaSharma5
ย 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
ย 
Chennai Call Girls Porur Phone ๐Ÿ† 8250192130 ๐Ÿ‘… celebrity escorts service
Chennai Call Girls Porur Phone ๐Ÿ† 8250192130 ๐Ÿ‘… celebrity escorts serviceChennai Call Girls Porur Phone ๐Ÿ† 8250192130 ๐Ÿ‘… celebrity escorts service
Chennai Call Girls Porur Phone ๐Ÿ† 8250192130 ๐Ÿ‘… celebrity escorts servicesonalikaur4
ย 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN โ˜
ย 
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”soniya singh
ย 
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445ruhi
ย 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
ย 
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...Sheetaleventcompany
ย 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goasexy call girls service in goa
ย 
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort ServiceEnjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort ServiceDelhi Call girls
ย 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
ย 
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...Diya Sharma
ย 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
ย 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
ย 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
ย 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
ย 

Recently uploaded (20)

How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
ย 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
ย 
Low Rate Young Call Girls in Sector 63 Mamura Noida โœ”๏ธโ˜†9289244007โœ”๏ธโ˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida โœ”๏ธโ˜†9289244007โœ”๏ธโ˜† Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida โœ”๏ธโ˜†9289244007โœ”๏ธโ˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida โœ”๏ธโ˜†9289244007โœ”๏ธโ˜† Female E...
ย 
Call Girls In South Ex ๐Ÿ“ฑ 9999965857 ๐Ÿคฉ Delhi ๐Ÿซฆ HOT AND SEXY VVIP ๐ŸŽ SERVICE
Call Girls In South Ex ๐Ÿ“ฑ  9999965857  ๐Ÿคฉ Delhi ๐Ÿซฆ HOT AND SEXY VVIP ๐ŸŽ SERVICECall Girls In South Ex ๐Ÿ“ฑ  9999965857  ๐Ÿคฉ Delhi ๐Ÿซฆ HOT AND SEXY VVIP ๐ŸŽ SERVICE
Call Girls In South Ex ๐Ÿ“ฑ 9999965857 ๐Ÿคฉ Delhi ๐Ÿซฆ HOT AND SEXY VVIP ๐ŸŽ SERVICE
ย 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
ย 
Chennai Call Girls Porur Phone ๐Ÿ† 8250192130 ๐Ÿ‘… celebrity escorts service
Chennai Call Girls Porur Phone ๐Ÿ† 8250192130 ๐Ÿ‘… celebrity escorts serviceChennai Call Girls Porur Phone ๐Ÿ† 8250192130 ๐Ÿ‘… celebrity escorts service
Chennai Call Girls Porur Phone ๐Ÿ† 8250192130 ๐Ÿ‘… celebrity escorts service
ย 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
ย 
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
ย 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
ย 
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...
ย 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
ย 
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort ServiceEnjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
ย 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
ย 
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
ย 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
ย 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
ย 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
ย 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
ย 

Digital Signatures Explained in 40 Characters

  • 2. What is a digital signature โ€ข A digital signature allows the holder of the secret key (the signing key) to sign a document โ€ข Everyone who knows the verification key can verify that the signature is valid (correctness) โ€ข No one can forge a signature even given the verification key even though he is given a signature
  • 3. Structure of digital signature โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜) โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘” โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
  • 4. Structure of digital signature scheme (DSS) โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜) โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘” โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1} โ€ข Correctness โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘š) = 1 โ€ข Unforgeability โ€ข To be continued
  • 5. DSS VS MAC โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜) โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘” โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1} โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ ๐‘˜ โ€ข ๐‘š๐‘Ž๐‘๐‘˜ ๐‘š โ†’ ๐‘ก โ€ข v๐‘’๐‘Ÿ๐‘˜ ๐‘š, ๐‘ก โ†’ {0,1}
  • 6. Mac forgery game M โ† {} ๐‘šโ€ฒ ๐‘กโ€ฒ k โˆˆ๐‘… 0,1 ๐‘  (๐‘š, ๐‘ก) Wins if โ€ข ๐‘š โˆ‰ ๐‘€ โ€ข ๐‘ฃ๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ ๐‘š, ๐‘ก = 1 ๐‘กโ€ฒ โ† ๐‘š๐‘Ž๐‘๐‘˜(๐‘šโ€ฒ) M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times as the adversary wants
  • 7. Signature forgery game M โ† {} ๐‘šโ€ฒ ๐‘ ๐‘–๐‘”โ€ฒ ๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘›(1๐‘  ) (๐‘š, ๐‘ ๐‘–๐‘”) Wins if โ€ข ๐‘š โˆ‰ ๐‘€ โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” = 1 ๐‘ ๐‘–๐‘”โ€ฒ โ† ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘šโ€ฒ) M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times as the adversary wants ๐‘ฃ๐‘˜
  • 8. Definition of signature scheme โ€ข Correctness: โ€ข Pr ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = 1 ๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘› 1๐‘  = 1 โ€ข Unforgeability โ€ข For all PPT adversary ๐ด, there exists negligible function ๐œ‡, โ€ข Pr ๐ด ๐‘ค๐‘–๐‘›๐‘  ๐‘กโ„Ž๐‘’ ๐‘ ๐‘–๐‘”๐‘›๐‘Ž๐‘ก๐‘ข๐‘Ÿ๐‘’ ๐‘“๐‘œ๐‘Ÿ๐‘”๐‘’๐‘Ÿ๐‘ฆ ๐‘”๐‘Ž๐‘š๐‘’ โ‰ค ๐œ‡(๐‘›)
  • 9. Relation between macs and signatures โ€ข Every signature scheme is a message authentication code. โ€ข A mac scheme is not necessarily a signature. โ€ข Without the key, it may be impossible to verify a mac.
  • 10. Signatures are expensive โ€ข They require public-key operations for each signature you wish to do. โ€ข Hash functions are relatively cheap
  • 11. Hash and sign โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a collision resistant hash function, then the following โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” ๐บ๐‘’๐‘›โ€ฒ 1๐‘  โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ โ€ฒ (๐ป ๐‘š ) โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ โ€ฒ ๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1
  • 12. Security of hash and sign โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a collision resistant hash function, then the following โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” ๐บ๐‘’๐‘›โ€ฒ 1๐‘  โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ โ€ฒ (๐ป ๐‘š ) โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ ๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1 โ€ข Essentially the same proof as hash and mac โ€ข Breaking security of this scheme means โ€ข Finding a collision โ€ข Finding a signature on an unsigned message
  • 13. Interesting property of plaintext RSA โ€ข ๐‘ ๐‘˜, ๐‘๐‘˜ โ† ๐พ๐‘’๐‘ฆ๐บ๐‘’๐‘› 1๐‘  โ‡’ ๐ธ๐‘›๐‘๐‘๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š โ€ข Due to the fact that ๐‘š๐‘’ ๐‘‘ = ๐‘š๐‘‘ ๐‘’ = ๐‘š๐‘’๐‘‘
  • 14. RSA signature scheme โ€ข Let (๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘›, ๐ธ๐‘›๐‘, ๐ท๐‘’๐‘) denote the RSA encryption scheme โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” {๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ, ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  } โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐‘ ๐‘–๐‘” = ๐‘š
  • 15. Insecure RSA signature scheme โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  } โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š๐‘‘ ๐‘’ = ๐‘š๐‘’โ‹…๐‘‘ = ๐‘š
  • 16. Secure RSA signature scheme โ€ข Assumptions โ€ข Random oracle ๐ป (Hash function modeled as a random oracle โ€ข ๐‘› = ๐‘๐‘ž where ๐‘, ๐‘ž are prime โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ , ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  } โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ป ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) = (๐ป(๐‘š))๐‘‘ ๐‘’ ๐‘š๐‘œ๐‘‘ ๐‘› โ€ข (๐ป(๐‘š))๐‘‘ ๐‘’ ๐‘š๐‘œ๐‘‘ ๐‘› = ๐ป(๐‘š)๐‘’โ‹…๐‘‘ ๐‘š๐‘œ๐‘‘ ๐œ™(๐‘›) (๐‘š๐‘œ๐‘‘ ๐‘›) = ๐ป(๐‘š)
  • 17. Schnorr signature scheme โ€ข Based on โ€ข Group G โ€ข Generator ๐‘” for G โ€ข Random oracle ๐ป โ€ข Discrete logarithm
  • 18. Schnorr signature scheme โ€ข Requirement: Group ๐บ, ๐บ = ๐‘ž, generator ๐‘”, random oracle ๐ป โ€ข ๐บ๐‘’๐‘› 1๐‘  โ€ข ๐‘ ๐‘˜ โˆˆ๐‘… ๐บ โ€ข ๐‘ฃ๐‘˜ โ† ๐‘”๐‘ ๐‘˜ โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜(๐‘š, ๐‘ ๐‘–๐‘”) โ€ข ๐‘Ž, ๐‘  โ† ๐‘ ๐‘–๐‘” โ€ข u โ† ๐‘”๐‘  โ‹… ๐‘ฃ๐‘˜โˆ’๐‘Ž โ€ข Output ๐ป ๐‘ข, ๐‘š = ๐‘Ž โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ€ข ๐‘ โˆˆ๐‘… ๐‘|๐บ| โ€ข ๐‘ข โ† ๐‘”๐‘ โ€ข ๐‘Ž โ† ๐ป(๐‘ข, ๐‘š) โ€ข ๐‘  โ† ๐‘Ž โ‹… ๐‘ ๐‘˜ + ๐‘ (๐‘š๐‘œ๐‘‘ ๐‘ž) โ€ข Output (๐‘Ž, ๐‘ )