SlideShare a Scribd company logo
1 of 18
Digital signatures
IUB BD
What is a digital signature
โ€ข A digital signature allows the holder of the secret key (the signing key)
to sign a document
โ€ข Everyone who knows the verification key can verify that the signature
is valid (correctness)
โ€ข No one can forge a signature even given the verification key even
though he is given a signature
Structure of digital signature
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜)
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘”
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
Structure of digital signature scheme (DSS)
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜)
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘”
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
โ€ข Correctness
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘š) = 1
โ€ข Unforgeability
โ€ข To be continued
DSS VS MAC
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜)
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘”
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ ๐‘˜
โ€ข ๐‘š๐‘Ž๐‘๐‘˜ ๐‘š โ†’ ๐‘ก
โ€ข v๐‘’๐‘Ÿ๐‘˜ ๐‘š, ๐‘ก โ†’ {0,1}
Mac forgery game
M โ† {}
๐‘šโ€ฒ
๐‘กโ€ฒ
k โˆˆ๐‘… 0,1 ๐‘ 
(๐‘š, ๐‘ก)
Wins if
โ€ข ๐‘š โˆ‰ ๐‘€
โ€ข ๐‘ฃ๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ ๐‘š, ๐‘ก = 1
๐‘กโ€ฒ โ† ๐‘š๐‘Ž๐‘๐‘˜(๐‘šโ€ฒ)
M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times
as the adversary wants
Signature forgery game
M โ† {}
๐‘šโ€ฒ
๐‘ ๐‘–๐‘”โ€ฒ
๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘›(1๐‘ 
)
(๐‘š, ๐‘ ๐‘–๐‘”)
Wins if
โ€ข ๐‘š โˆ‰ ๐‘€
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” = 1
๐‘ ๐‘–๐‘”โ€ฒ โ† ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘šโ€ฒ)
M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times
as the adversary wants
๐‘ฃ๐‘˜
Definition of signature scheme
โ€ข Correctness:
โ€ข Pr ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = 1 ๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘› 1๐‘  = 1
โ€ข Unforgeability
โ€ข For all PPT adversary ๐ด, there exists negligible function ๐œ‡,
โ€ข Pr ๐ด ๐‘ค๐‘–๐‘›๐‘  ๐‘กโ„Ž๐‘’ ๐‘ ๐‘–๐‘”๐‘›๐‘Ž๐‘ก๐‘ข๐‘Ÿ๐‘’ ๐‘“๐‘œ๐‘Ÿ๐‘”๐‘’๐‘Ÿ๐‘ฆ ๐‘”๐‘Ž๐‘š๐‘’ โ‰ค ๐œ‡(๐‘›)
Relation between macs and signatures
โ€ข Every signature scheme is a message authentication code.
โ€ข A mac scheme is not necessarily a signature.
โ€ข Without the key, it may be impossible to verify a mac.
Signatures are expensive
โ€ข They require public-key operations for each signature you wish to do.
โ€ข Hash functions are relatively cheap
Hash and sign
โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a
collision resistant hash function, then the following
โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” ๐บ๐‘’๐‘›โ€ฒ 1๐‘ 
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜
โ€ฒ
(๐ป ๐‘š )
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜
โ€ฒ
๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1
Security of hash and sign
โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a collision resistant hash function, then the
following
โ€ข ๐บ๐‘’๐‘› 1๐‘ 
โ‰” ๐บ๐‘’๐‘›โ€ฒ
1๐‘ 
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜
โ€ฒ
(๐ป ๐‘š )
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ
๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1
โ€ข Essentially the same proof as hash and mac
โ€ข Breaking security of this scheme means
โ€ข Finding a collision
โ€ข Finding a signature on an unsigned message
Interesting property of plaintext RSA
โ€ข ๐‘ ๐‘˜, ๐‘๐‘˜ โ† ๐พ๐‘’๐‘ฆ๐บ๐‘’๐‘› 1๐‘  โ‡’ ๐ธ๐‘›๐‘๐‘๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š
โ€ข Due to the fact that ๐‘š๐‘’ ๐‘‘ = ๐‘š๐‘‘ ๐‘’
= ๐‘š๐‘’๐‘‘
RSA signature scheme
โ€ข Let (๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘›, ๐ธ๐‘›๐‘, ๐ท๐‘’๐‘) denote the RSA encryption scheme
โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” {๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ, ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  }
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐‘ ๐‘–๐‘” = ๐‘š
Insecure RSA signature scheme
โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  }
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š
โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š๐‘‘ ๐‘’
= ๐‘š๐‘’โ‹…๐‘‘ = ๐‘š
Secure RSA signature scheme
โ€ข Assumptions
โ€ข Random oracle ๐ป (Hash function modeled as a random oracle
โ€ข ๐‘› = ๐‘๐‘ž where ๐‘, ๐‘ž are prime
โ€ข ๐บ๐‘’๐‘› 1๐‘ 
โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ
, ๐‘๐‘˜โ€ฒ
โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘ 
}
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š)
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ป ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š)
โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) = (๐ป(๐‘š))๐‘‘ ๐‘’
๐‘š๐‘œ๐‘‘ ๐‘›
โ€ข (๐ป(๐‘š))๐‘‘ ๐‘’
๐‘š๐‘œ๐‘‘ ๐‘› = ๐ป(๐‘š)๐‘’โ‹…๐‘‘ ๐‘š๐‘œ๐‘‘ ๐œ™(๐‘›)
(๐‘š๐‘œ๐‘‘ ๐‘›) = ๐ป(๐‘š)
Schnorr signature scheme
โ€ข Based on
โ€ข Group G
โ€ข Generator ๐‘” for G
โ€ข Random oracle ๐ป
โ€ข Discrete logarithm
Schnorr signature scheme
โ€ข Requirement: Group ๐บ, ๐บ = ๐‘ž, generator ๐‘”, random oracle ๐ป
โ€ข ๐บ๐‘’๐‘› 1๐‘ 
โ€ข ๐‘ ๐‘˜ โˆˆ๐‘… ๐บ
โ€ข ๐‘ฃ๐‘˜ โ† ๐‘”๐‘ ๐‘˜
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜(๐‘š, ๐‘ ๐‘–๐‘”)
โ€ข ๐‘Ž, ๐‘  โ† ๐‘ ๐‘–๐‘”
โ€ข u โ† ๐‘”๐‘  โ‹… ๐‘ฃ๐‘˜โˆ’๐‘Ž
โ€ข Output ๐ป ๐‘ข, ๐‘š = ๐‘Ž
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š
โ€ข ๐‘ โˆˆ๐‘… ๐‘|๐บ|
โ€ข ๐‘ข โ† ๐‘”๐‘
โ€ข ๐‘Ž โ† ๐ป(๐‘ข, ๐‘š)
โ€ข ๐‘  โ† ๐‘Ž โ‹… ๐‘ ๐‘˜ + ๐‘ (๐‘š๐‘œ๐‘‘ ๐‘ž)
โ€ข Output (๐‘Ž, ๐‘ )

More Related Content

Similar to digital signatures.pptx

ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11MITSUNARI Shigeo
ย 
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–MITSUNARI Shigeo
ย 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKIRabei Hassan
ย 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionPeter Waher
ย 
Hash functions
Hash functionsHash functions
Hash functionssameezahur
ย 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynoteKaya Ota
ย 
apidays LIVE Australia - WT* is JWT? by Maciej Treder
apidays LIVE Australia -  WT* is JWT? by Maciej Trederapidays LIVE Australia -  WT* is JWT? by Maciej Treder
apidays LIVE Australia - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Trederapidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Trederapidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE New York - WT* is JWT? by Maciej Treder
apidays LIVE New York -  WT* is JWT? by Maciej Trederapidays LIVE New York -  WT* is JWT? by Maciej Treder
apidays LIVE New York - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Trederapidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Trederapidays
ย 
Predicate-Preserving Collision-Resistant Hashing
Predicate-Preserving  Collision-Resistant HashingPredicate-Preserving  Collision-Resistant Hashing
Predicate-Preserving Collision-Resistant HashingPhilippe Camacho, Ph.D.
ย 
Face verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creationFace verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creationDeep Learning Italia
ย 
ๆš—่ชๆœฌ่ชญๆ›ธไผš6
ๆš—่ชๆœฌ่ชญๆ›ธไผš6ๆš—่ชๆœฌ่ชญๆ›ธไผš6
ๆš—่ชๆœฌ่ชญๆ›ธไผš6MITSUNARI Shigeo
ย 

Similar to digital signatures.pptx (15)

ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ย 
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
ย 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
ย 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
ย 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to Encryption
ย 
Hash functions
Hash functionsHash functions
Hash functions
ย 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynote
ย 
apidays LIVE Australia - WT* is JWT? by Maciej Treder
apidays LIVE Australia -  WT* is JWT? by Maciej Trederapidays LIVE Australia -  WT* is JWT? by Maciej Treder
apidays LIVE Australia - WT* is JWT? by Maciej Treder
ย 
apidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Trederapidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Treder
ย 
apidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Trederapidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
ย 
apidays LIVE New York - WT* is JWT? by Maciej Treder
apidays LIVE New York -  WT* is JWT? by Maciej Trederapidays LIVE New York -  WT* is JWT? by Maciej Treder
apidays LIVE New York - WT* is JWT? by Maciej Treder
ย 
apidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Trederapidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Treder
ย 
Predicate-Preserving Collision-Resistant Hashing
Predicate-Preserving  Collision-Resistant HashingPredicate-Preserving  Collision-Resistant Hashing
Predicate-Preserving Collision-Resistant Hashing
ย 
Face verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creationFace verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creation
ย 
ๆš—่ชๆœฌ่ชญๆ›ธไผš6
ๆš—่ชๆœฌ่ชญๆ›ธไผš6ๆš—่ชๆœฌ่ชญๆ›ธไผš6
ๆš—่ชๆœฌ่ชญๆ›ธไผš6
ย 

More from AliAshraf68199

What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
ย 
WindowsRegistry.ppt
WindowsRegistry.pptWindowsRegistry.ppt
WindowsRegistry.pptAliAshraf68199
ย 
digital signatures1.pptx
digital signatures1.pptxdigital signatures1.pptx
digital signatures1.pptxAliAshraf68199
ย 
module_14_digital_signatures (1).pptx
module_14_digital_signatures (1).pptxmodule_14_digital_signatures (1).pptx
module_14_digital_signatures (1).pptxAliAshraf68199
ย 
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptxlecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptxAliAshraf68199
ย 

More from AliAshraf68199 (6)

What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
ย 
Week1_2.ppt
Week1_2.pptWeek1_2.ppt
Week1_2.ppt
ย 
WindowsRegistry.ppt
WindowsRegistry.pptWindowsRegistry.ppt
WindowsRegistry.ppt
ย 
digital signatures1.pptx
digital signatures1.pptxdigital signatures1.pptx
digital signatures1.pptx
ย 
module_14_digital_signatures (1).pptx
module_14_digital_signatures (1).pptxmodule_14_digital_signatures (1).pptx
module_14_digital_signatures (1).pptx
ย 
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptxlecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
ย 

Recently uploaded

Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLimonikaupta
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
ย 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistKHM Anwar
ย 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN โ˜
ย 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
ย 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goasexy call girls service in goa
ย 
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort ServiceEnjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort ServiceDelhi Call girls
ย 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
ย 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
ย 
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Standkumarajju5765
ย 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
ย 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
ย 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
ย 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
ย 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
ย 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
ย 
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”soniya singh
ย 

Recently uploaded (20)

Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
ย 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization Specialist
ย 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
ย 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
ย 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
ย 
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort ServiceEnjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
ย 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
ย 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
ย 
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
ย 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
ย 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
ย 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
ย 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
ย 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
ย 
Call Girls In Noida ๐Ÿ“ฑ 9999965857 ๐Ÿคฉ Delhi ๐Ÿซฆ HOT AND SEXY VVIP ๐ŸŽ SERVICE
Call Girls In Noida ๐Ÿ“ฑ  9999965857  ๐Ÿคฉ Delhi ๐Ÿซฆ HOT AND SEXY VVIP ๐ŸŽ SERVICECall Girls In Noida ๐Ÿ“ฑ  9999965857  ๐Ÿคฉ Delhi ๐Ÿซฆ HOT AND SEXY VVIP ๐ŸŽ SERVICE
Call Girls In Noida ๐Ÿ“ฑ 9999965857 ๐Ÿคฉ Delhi ๐Ÿซฆ HOT AND SEXY VVIP ๐ŸŽ SERVICE
ย 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
ย 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
ย 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
ย 
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 

digital signatures.pptx

  • 2. What is a digital signature โ€ข A digital signature allows the holder of the secret key (the signing key) to sign a document โ€ข Everyone who knows the verification key can verify that the signature is valid (correctness) โ€ข No one can forge a signature even given the verification key even though he is given a signature
  • 3. Structure of digital signature โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜) โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘” โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
  • 4. Structure of digital signature scheme (DSS) โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜) โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘” โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1} โ€ข Correctness โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘š) = 1 โ€ข Unforgeability โ€ข To be continued
  • 5. DSS VS MAC โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜) โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘” โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1} โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ ๐‘˜ โ€ข ๐‘š๐‘Ž๐‘๐‘˜ ๐‘š โ†’ ๐‘ก โ€ข v๐‘’๐‘Ÿ๐‘˜ ๐‘š, ๐‘ก โ†’ {0,1}
  • 6. Mac forgery game M โ† {} ๐‘šโ€ฒ ๐‘กโ€ฒ k โˆˆ๐‘… 0,1 ๐‘  (๐‘š, ๐‘ก) Wins if โ€ข ๐‘š โˆ‰ ๐‘€ โ€ข ๐‘ฃ๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ ๐‘š, ๐‘ก = 1 ๐‘กโ€ฒ โ† ๐‘š๐‘Ž๐‘๐‘˜(๐‘šโ€ฒ) M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times as the adversary wants
  • 7. Signature forgery game M โ† {} ๐‘šโ€ฒ ๐‘ ๐‘–๐‘”โ€ฒ ๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘›(1๐‘  ) (๐‘š, ๐‘ ๐‘–๐‘”) Wins if โ€ข ๐‘š โˆ‰ ๐‘€ โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” = 1 ๐‘ ๐‘–๐‘”โ€ฒ โ† ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘šโ€ฒ) M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times as the adversary wants ๐‘ฃ๐‘˜
  • 8. Definition of signature scheme โ€ข Correctness: โ€ข Pr ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = 1 ๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘› 1๐‘  = 1 โ€ข Unforgeability โ€ข For all PPT adversary ๐ด, there exists negligible function ๐œ‡, โ€ข Pr ๐ด ๐‘ค๐‘–๐‘›๐‘  ๐‘กโ„Ž๐‘’ ๐‘ ๐‘–๐‘”๐‘›๐‘Ž๐‘ก๐‘ข๐‘Ÿ๐‘’ ๐‘“๐‘œ๐‘Ÿ๐‘”๐‘’๐‘Ÿ๐‘ฆ ๐‘”๐‘Ž๐‘š๐‘’ โ‰ค ๐œ‡(๐‘›)
  • 9. Relation between macs and signatures โ€ข Every signature scheme is a message authentication code. โ€ข A mac scheme is not necessarily a signature. โ€ข Without the key, it may be impossible to verify a mac.
  • 10. Signatures are expensive โ€ข They require public-key operations for each signature you wish to do. โ€ข Hash functions are relatively cheap
  • 11. Hash and sign โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a collision resistant hash function, then the following โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” ๐บ๐‘’๐‘›โ€ฒ 1๐‘  โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ โ€ฒ (๐ป ๐‘š ) โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ โ€ฒ ๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1
  • 12. Security of hash and sign โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a collision resistant hash function, then the following โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” ๐บ๐‘’๐‘›โ€ฒ 1๐‘  โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ โ€ฒ (๐ป ๐‘š ) โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ ๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1 โ€ข Essentially the same proof as hash and mac โ€ข Breaking security of this scheme means โ€ข Finding a collision โ€ข Finding a signature on an unsigned message
  • 13. Interesting property of plaintext RSA โ€ข ๐‘ ๐‘˜, ๐‘๐‘˜ โ† ๐พ๐‘’๐‘ฆ๐บ๐‘’๐‘› 1๐‘  โ‡’ ๐ธ๐‘›๐‘๐‘๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š โ€ข Due to the fact that ๐‘š๐‘’ ๐‘‘ = ๐‘š๐‘‘ ๐‘’ = ๐‘š๐‘’๐‘‘
  • 14. RSA signature scheme โ€ข Let (๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘›, ๐ธ๐‘›๐‘, ๐ท๐‘’๐‘) denote the RSA encryption scheme โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” {๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ, ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  } โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐‘ ๐‘–๐‘” = ๐‘š
  • 15. Insecure RSA signature scheme โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  } โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š๐‘‘ ๐‘’ = ๐‘š๐‘’โ‹…๐‘‘ = ๐‘š
  • 16. Secure RSA signature scheme โ€ข Assumptions โ€ข Random oracle ๐ป (Hash function modeled as a random oracle โ€ข ๐‘› = ๐‘๐‘ž where ๐‘, ๐‘ž are prime โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ , ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  } โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ป ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) = (๐ป(๐‘š))๐‘‘ ๐‘’ ๐‘š๐‘œ๐‘‘ ๐‘› โ€ข (๐ป(๐‘š))๐‘‘ ๐‘’ ๐‘š๐‘œ๐‘‘ ๐‘› = ๐ป(๐‘š)๐‘’โ‹…๐‘‘ ๐‘š๐‘œ๐‘‘ ๐œ™(๐‘›) (๐‘š๐‘œ๐‘‘ ๐‘›) = ๐ป(๐‘š)
  • 17. Schnorr signature scheme โ€ข Based on โ€ข Group G โ€ข Generator ๐‘” for G โ€ข Random oracle ๐ป โ€ข Discrete logarithm
  • 18. Schnorr signature scheme โ€ข Requirement: Group ๐บ, ๐บ = ๐‘ž, generator ๐‘”, random oracle ๐ป โ€ข ๐บ๐‘’๐‘› 1๐‘  โ€ข ๐‘ ๐‘˜ โˆˆ๐‘… ๐บ โ€ข ๐‘ฃ๐‘˜ โ† ๐‘”๐‘ ๐‘˜ โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜(๐‘š, ๐‘ ๐‘–๐‘”) โ€ข ๐‘Ž, ๐‘  โ† ๐‘ ๐‘–๐‘” โ€ข u โ† ๐‘”๐‘  โ‹… ๐‘ฃ๐‘˜โˆ’๐‘Ž โ€ข Output ๐ป ๐‘ข, ๐‘š = ๐‘Ž โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ€ข ๐‘ โˆˆ๐‘… ๐‘|๐บ| โ€ข ๐‘ข โ† ๐‘”๐‘ โ€ข ๐‘Ž โ† ๐ป(๐‘ข, ๐‘š) โ€ข ๐‘  โ† ๐‘Ž โ‹… ๐‘ ๐‘˜ + ๐‘ (๐‘š๐‘œ๐‘‘ ๐‘ž) โ€ข Output (๐‘Ž, ๐‘ )