SlideShare a Scribd company logo
Theory Seminar - Cryptography




               A Signature Scheme as Secure as the Diffie
                           Hellman Problem
                                        Theory Seminar


                                Eu-Jin Goh and Stanislaw Jarecki
                                        Eurocrypt 2003

                                          Subhashini V
                                           IIT Madras
Theory Seminar - Cryptography




Outline

       1 Introduction
               Hard Assumptions

       2 Signature Scheme
               Definition
               EDL Scheme

       3 Security
               CMA model
               Unforgeability
               Forgery
               Probability

       4 References
Theory Seminar - Cryptography
  Introduction




Objective of this talk



      Introduction to
                 Hardness assumption - CDH
                 Reduction techniques
                 ZKP in cryptosystems
                 Random oracle model
                 Signature scheme
Theory Seminar - Cryptography
  Introduction
     Hard Assumptions




                 Hard Assumption
                 Discrete log problem
                 - Given: g, g a         Find: a
                 CDH - Computational Diffie-Hellman
                 - Given: g, g a , g b   Compute: g ab
                 Reduction to hard assumption
                 What is tightness?
Theory Seminar - Cryptography
  Signature Scheme
     Definition



Digital Signature Scheme




                 Key Generation - private key (sk) and public key (pk)
                 Sign - Sign(M, sk) → σ
                 Verify - V er(pk, M, σ) Output: Accept or Reject
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
                  2   NI-ZKP DLh (z) = DLg (y)
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
                  2   NI-ZKP DLh (z) = DLg (y)
                  3   k ∈R Zq , u ← g k , v ← hk
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
                  2   NI-ZKP DLh (z) = DLg (y)
                  3   k ∈R Zq , u ← g k , v ← hk
                  4   c ← H (g, h, y, z, u, v) ∈ Zq
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
                  2   NI-ZKP DLh (z) = DLg (y)
                  3   k ∈R Zq , u ← g k , v ← hk
                  4   c ← H (g, h, y, z, u, v) ∈ Zq
                  5   s ← k + cx
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
                  2   NI-ZKP DLh (z) = DLg (y)
                  3   k ∈R Zq , u ← g k , v ← hk
                  4   c ← H (g, h, y, z, u, v) ∈ Zq
                  5   s ← k + cx
                  6   σ ← (z, r, s, c)
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
                  2   NI-ZKP DLh (z) = DLg (y)
                  3   k ∈R Zq , u ← g k , v ← hk
                  4   c ← H (g, h, y, z, u, v) ∈ Zq
                  5   s ← k + cx
                  6   σ ← (z, r, s, c)
              Verify
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
                  2   NI-ZKP DLh (z) = DLg (y)
                  3   k ∈R Zq , u ← g k , v ← hk
                  4   c ← H (g, h, y, z, u, v) ∈ Zq
                  5   s ← k + cx
                  6   σ ← (z, r, s, c)
              Verify
                      h ← H(M, r) , u ← g s y −c , v ← h s z −c
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
                  2   NI-ZKP DLh (z) = DLg (y)
                  3   k ∈R Zq , u ← g k , v ← hk
                  4   c ← H (g, h, y, z, u, v) ∈ Zq
                  5   s ← k + cx
                  6   σ ← (z, r, s, c)
              Verify
                      h ← H(M, r) , u ← g s y −c , v ← h s z −c
                                                          ?
                      c = H (g, h , y, z, u , v ). Check c = c
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



Proof of equality of DL


      Replacing ZK-proof of knowledge with just a ZKP
              k ∈ Zq ; u = g k ; v = hk
              s = k + cx; g s = uy c ; hs = vz c
              Also, proof of knowledge of x: g x = y; hx = z
              x = DLg (y); x = DLh (z)
              Possible only if c = (k − k )/(x − x)
                  where k = DLg (u) and k = DLh (v)
Theory Seminar - Cryptography
  Security
     CMA model



Security Model




      Chosen Message Attack (CMA)
              Adaptive chosen messages.
              Training with oracles (hash, sign)
              Adversary A outputs forgery.
Theory Seminar - Cryptography
  Security
     Unforgeability



Unforgeability

      Random oracle model - solve CDH. (Proof is from [?])
              Setup: y = g a (a is unknown)
              H queries: embed - H(M, r) = h = (g b )d , d - random
              H queries: all random.
              Sign queries:
                      r ∈R {0, 1}nr . If H(M, r) is queried - abort.
                      κ ∈R Z . Set, z = y κ , h = g κ and H(M, r) = h
                      DLh (z) = DLg (y)
                      c ∈R Zq , s ∈R Zq ,. Set u = g s y −c and v = hs z −c
                      Store H (g, h, y, z, u, v) = c
                      σ = (z, r, s, c)
Theory Seminar - Cryptography
  Security
     Forgery



Solving CDH



      Forgery passes verification.
               h = H(M, r) = g bd
               DLh (z) = DLg (y) ⇒ z = ha = g abd
               Output : z 1/d = g ab
      Solved CDH.
Theory Seminar - Cryptography
  Security
     Probability



Analysis - Probability of solving CDH

      Abort cases
             1   H(M, r) was queried! ⇒ P r = qH 2−nr
                 - Aborting in Step1 of signature P r = qsig · qH · 2−nr
             2   Abort at Step4 of signature H (g, g k , y, y k , u, uk ) queried!
                 - Probability of collision (qH + qsig ) · 2−2nq
                 - Final : P r = qsig · (qH + qsig ) · 2−2nq
      Cannot solve CDH on successful forgery (because of DL)
             1   Pr[N H ∧ ¬N Q] = 2−nq
             2   Pr[N Q] = qH · 2−nq

      NH - event that the attacker does not query H-oracle.
      NQ - event that DLg (y) = DLh (z)
Theory Seminar - Cryptography
  Security
     Probability




      We assume that the attacker can break the signature scheme with
      a non-negligible probability of .
      Then, if is the probability of challenger(C) solving CDH problem
      using attacker.


                   = −(         abort   +   DL )
                                             −nr
                   = − qsig · qH · 2               − qsig · (qH + qsig ) · 2−2nq
                                                                     − 2−nq − qH · 2−nq

             is non-negligible and hence C can solve CDH.
Theory Seminar - Cryptography
  References




References I


               David Chaum, Jan-Hendrik Evertse, and Jeroen Van De Graaf.
               An improved protocol for demonstrating possession of discrete
               logarithms and some generalizations. In Proceedings of the 6th
               annual international conference on Theory and application of
               cryptographic techniques, EUROCRYPT’87, pages 127–141,
               Berlin, Heidelberg, 1988. Springer-Verlag.
               David Chaum and Torben P. Pedersen. Wallet databases with
               observers. In Proceedings of the 12th Annual International
               Cryptology Conference on Advances in Cryptology, CRYPTO
               ’92, pages 89–105, London, UK, 1993. Springer-Verlag.
Theory Seminar - Cryptography
  References




References II




               Eu-Jin Goh and StanisJarecki. A signature scheme as secure as
               the diffie-hellman problem. In Proceedings of the 22nd
               international conference on Theory and applications of
               cryptographic techniques, EUROCRYPT’03, pages 401–415,
               Berlin, Heidelberg, 2003. Springer-Verlag.
Theory Seminar - Cryptography
  References




Questions?




                                Thank You!

More Related Content

What's hot

04 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x204 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x2
MuradAmn
 
Information in the Weights
Information in the WeightsInformation in the Weights
Information in the Weights
Mark Chang
 
Nominal Schema DL 2011
Nominal Schema DL 2011Nominal Schema DL 2011
Nominal Schema DL 2011
Adila Krisnadhi
 
Discrete Logarithm Problem over Prime Fields, Non-canonical Lifts and Logarit...
Discrete Logarithm Problem over Prime Fields, Non-canonical Lifts and Logarit...Discrete Logarithm Problem over Prime Fields, Non-canonical Lifts and Logarit...
Discrete Logarithm Problem over Prime Fields, Non-canonical Lifts and Logarit...
PadmaGadiyar
 
Accelerating Collapsed Variational Bayesian Inference for Latent Dirichlet Al...
Accelerating Collapsed Variational Bayesian Inference for Latent Dirichlet Al...Accelerating Collapsed Variational Bayesian Inference for Latent Dirichlet Al...
Accelerating Collapsed Variational Bayesian Inference for Latent Dirichlet Al...Tomonari Masada
 
Modeling the Dynamics of SGD by Stochastic Differential Equation
Modeling the Dynamics of SGD by Stochastic Differential EquationModeling the Dynamics of SGD by Stochastic Differential Equation
Modeling the Dynamics of SGD by Stochastic Differential Equation
Mark Chang
 
CrystalBall - Compute Relative Frequency in Hadoop
CrystalBall - Compute Relative Frequency in Hadoop CrystalBall - Compute Relative Frequency in Hadoop
CrystalBall - Compute Relative Frequency in Hadoop
Suvash Shah
 
snarks <3 hash functions
snarks <3 hash functionssnarks <3 hash functions
snarks <3 hash functions
Rebekah Mercer
 
Lecture4 kenrels functions_rkhs
Lecture4 kenrels functions_rkhsLecture4 kenrels functions_rkhs
Lecture4 kenrels functions_rkhsStéphane Canu
 
On generalized dislocated quasi metrics
On generalized dislocated quasi metricsOn generalized dislocated quasi metrics
On generalized dislocated quasi metricsAlexander Decker
 
11.on generalized dislocated quasi metrics
11.on generalized dislocated quasi metrics11.on generalized dislocated quasi metrics
11.on generalized dislocated quasi metricsAlexander Decker
 
My presentation at University of Nottingham "Fast low-rank methods for solvin...
My presentation at University of Nottingham "Fast low-rank methods for solvin...My presentation at University of Nottingham "Fast low-rank methods for solvin...
My presentation at University of Nottingham "Fast low-rank methods for solvin...
Alexander Litvinenko
 
Discrete Models in Computer Vision
Discrete Models in Computer VisionDiscrete Models in Computer Vision
Discrete Models in Computer Vision
Yap Wooi Hen
 
On Nets and Meshes
On Nets and MeshesOn Nets and Meshes
On Nets and Meshes
Don Sheehy
 
Aaex7 group2(中英夾雜)
Aaex7 group2(中英夾雜)Aaex7 group2(中英夾雜)
Aaex7 group2(中英夾雜)Shiang-Yun Yang
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate provider
Kishankant Yadav
 
Datastructure tree
Datastructure treeDatastructure tree
Datastructure tree
rantd
 
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
Alex Pruden
 
Least squares support Vector Machine Classifier
Least squares support Vector Machine ClassifierLeast squares support Vector Machine Classifier
Least squares support Vector Machine Classifier
Raj Sikarwar
 

What's hot (20)

04 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x204 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x2
 
Information in the Weights
Information in the WeightsInformation in the Weights
Information in the Weights
 
Nominal Schema DL 2011
Nominal Schema DL 2011Nominal Schema DL 2011
Nominal Schema DL 2011
 
Discrete Logarithm Problem over Prime Fields, Non-canonical Lifts and Logarit...
Discrete Logarithm Problem over Prime Fields, Non-canonical Lifts and Logarit...Discrete Logarithm Problem over Prime Fields, Non-canonical Lifts and Logarit...
Discrete Logarithm Problem over Prime Fields, Non-canonical Lifts and Logarit...
 
Accelerating Collapsed Variational Bayesian Inference for Latent Dirichlet Al...
Accelerating Collapsed Variational Bayesian Inference for Latent Dirichlet Al...Accelerating Collapsed Variational Bayesian Inference for Latent Dirichlet Al...
Accelerating Collapsed Variational Bayesian Inference for Latent Dirichlet Al...
 
Modeling the Dynamics of SGD by Stochastic Differential Equation
Modeling the Dynamics of SGD by Stochastic Differential EquationModeling the Dynamics of SGD by Stochastic Differential Equation
Modeling the Dynamics of SGD by Stochastic Differential Equation
 
CrystalBall - Compute Relative Frequency in Hadoop
CrystalBall - Compute Relative Frequency in Hadoop CrystalBall - Compute Relative Frequency in Hadoop
CrystalBall - Compute Relative Frequency in Hadoop
 
snarks <3 hash functions
snarks <3 hash functionssnarks <3 hash functions
snarks <3 hash functions
 
Lecture4 kenrels functions_rkhs
Lecture4 kenrels functions_rkhsLecture4 kenrels functions_rkhs
Lecture4 kenrels functions_rkhs
 
On generalized dislocated quasi metrics
On generalized dislocated quasi metricsOn generalized dislocated quasi metrics
On generalized dislocated quasi metrics
 
11.on generalized dislocated quasi metrics
11.on generalized dislocated quasi metrics11.on generalized dislocated quasi metrics
11.on generalized dislocated quasi metrics
 
My presentation at University of Nottingham "Fast low-rank methods for solvin...
My presentation at University of Nottingham "Fast low-rank methods for solvin...My presentation at University of Nottingham "Fast low-rank methods for solvin...
My presentation at University of Nottingham "Fast low-rank methods for solvin...
 
Discrete Models in Computer Vision
Discrete Models in Computer VisionDiscrete Models in Computer Vision
Discrete Models in Computer Vision
 
On Nets and Meshes
On Nets and MeshesOn Nets and Meshes
On Nets and Meshes
 
Aaex7 group2(中英夾雜)
Aaex7 group2(中英夾雜)Aaex7 group2(中英夾雜)
Aaex7 group2(中英夾雜)
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate provider
 
Datastructure tree
Datastructure treeDatastructure tree
Datastructure tree
 
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
 
ICME 2013
ICME 2013ICME 2013
ICME 2013
 
Least squares support Vector Machine Classifier
Least squares support Vector Machine ClassifierLeast squares support Vector Machine Classifier
Least squares support Vector Machine Classifier
 

Viewers also liked

Report on Free space optics
Report on Free space opticsReport on Free space optics
Report on Free space optics
Santhoshkumar Yadav
 
Free space optics
Free space opticsFree space optics
Free space optics
Santhoshkumar Yadav
 
Report Cryptography
Report CryptographyReport Cryptography
Report Cryptography
Ferro Demetrio
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
Saurabh Nambiar
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full reportharpoo123143
 
Free space optical communication
Free space optical communicationFree space optical communication
Free space optical communication
Santhoshkumar Yadav
 
Free space optical communication
Free space optical communicationFree space optical communication
Free space optical communication
Ahmed El-Sayed
 
Free space optics (fso) seminar report full
Free space optics (fso) seminar report fullFree space optics (fso) seminar report full
Free space optics (fso) seminar report full
Dilip Prajapati
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 

Viewers also liked (14)

Report on Free space optics
Report on Free space opticsReport on Free space optics
Report on Free space optics
 
Free space optics
Free space opticsFree space optics
Free space optics
 
Report Cryptography
Report CryptographyReport Cryptography
Report Cryptography
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
 
Free space optics
Free space opticsFree space optics
Free space optics
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Free space optical communication
Free space optical communicationFree space optical communication
Free space optical communication
 
Free space optical communication
Free space optical communicationFree space optical communication
Free space optical communication
 
Free space optics (fso) seminar report full
Free space optics (fso) seminar report fullFree space optics (fso) seminar report full
Free space optics (fso) seminar report full
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similar to A Signature Scheme as Secure as the Diffie Hellman Problem

Quantum Machine Learning and QEM for Gaussian mixture models (Alessandro Luongo)
Quantum Machine Learning and QEM for Gaussian mixture models (Alessandro Luongo)Quantum Machine Learning and QEM for Gaussian mixture models (Alessandro Luongo)
Quantum Machine Learning and QEM for Gaussian mixture models (Alessandro Luongo)
MeetupDataScienceRoma
 
Decision Making with Hierarchical Credal Sets (IPMU 2014)
Decision Making with Hierarchical Credal Sets (IPMU 2014)Decision Making with Hierarchical Credal Sets (IPMU 2014)
Decision Making with Hierarchical Credal Sets (IPMU 2014)
Alessandro Antonucci
 
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
The Statistical and Applied Mathematical Sciences Institute
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
Victor Pereira
 
Error control coding bch, reed-solomon etc..
Error control coding   bch, reed-solomon etc..Error control coding   bch, reed-solomon etc..
Error control coding bch, reed-solomon etc..
Madhumita Tamhane
 
Hecke Operators on Jacobi Forms of Lattice Index and the Relation to Elliptic...
Hecke Operators on Jacobi Forms of Lattice Index and the Relation to Elliptic...Hecke Operators on Jacobi Forms of Lattice Index and the Relation to Elliptic...
Hecke Operators on Jacobi Forms of Lattice Index and the Relation to Elliptic...
Ali Ajouz
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
Göktuğ Serez
 
Digital Signatures: Reassessing security of randomizable signatures
Digital Signatures: Reassessing security of randomizable signaturesDigital Signatures: Reassessing security of randomizable signatures
Digital Signatures: Reassessing security of randomizable signatures
Priyanka Aash
 
Introduction to modern Variational Inference.
Introduction to modern Variational Inference.Introduction to modern Variational Inference.
Introduction to modern Variational Inference.
Tomasz Kusmierczyk
 
Tensor Train data format for uncertainty quantification
Tensor Train data format for uncertainty quantificationTensor Train data format for uncertainty quantification
Tensor Train data format for uncertainty quantification
Alexander Litvinenko
 
Auto encoding-variational-bayes
Auto encoding-variational-bayesAuto encoding-variational-bayes
Auto encoding-variational-bayes
mehdi Cherti
 
Comparing estimation algorithms for block clustering models
Comparing estimation algorithms for block clustering modelsComparing estimation algorithms for block clustering models
Comparing estimation algorithms for block clustering models
BigMC
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
The Statistical and Applied Mathematical Sciences Institute
 
Spreading Rumors Quietly and the Subgroup Escape Problem
Spreading Rumors Quietly and the Subgroup Escape ProblemSpreading Rumors Quietly and the Subgroup Escape Problem
Spreading Rumors Quietly and the Subgroup Escape ProblemAleksandr Yampolskiy
 
QMC Error SAMSI Tutorial Aug 2017
QMC Error SAMSI Tutorial Aug 2017QMC Error SAMSI Tutorial Aug 2017
QMC Error SAMSI Tutorial Aug 2017
Fred J. Hickernell
 
Response Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationResponse Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty Quantification
Alexander Litvinenko
 
Declarative Datalog Debugging for Mere Mortals
Declarative Datalog Debugging for Mere MortalsDeclarative Datalog Debugging for Mere Mortals
Declarative Datalog Debugging for Mere Mortals
Bertram Ludäscher
 
Number theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-newNumber theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-new
Christos Loizos
 
2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf
2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf
2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf
Advanced-Concepts-Team
 

Similar to A Signature Scheme as Secure as the Diffie Hellman Problem (20)

Quantum Machine Learning and QEM for Gaussian mixture models (Alessandro Luongo)
Quantum Machine Learning and QEM for Gaussian mixture models (Alessandro Luongo)Quantum Machine Learning and QEM for Gaussian mixture models (Alessandro Luongo)
Quantum Machine Learning and QEM for Gaussian mixture models (Alessandro Luongo)
 
Decision Making with Hierarchical Credal Sets (IPMU 2014)
Decision Making with Hierarchical Credal Sets (IPMU 2014)Decision Making with Hierarchical Credal Sets (IPMU 2014)
Decision Making with Hierarchical Credal Sets (IPMU 2014)
 
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Error control coding bch, reed-solomon etc..
Error control coding   bch, reed-solomon etc..Error control coding   bch, reed-solomon etc..
Error control coding bch, reed-solomon etc..
 
Hecke Operators on Jacobi Forms of Lattice Index and the Relation to Elliptic...
Hecke Operators on Jacobi Forms of Lattice Index and the Relation to Elliptic...Hecke Operators on Jacobi Forms of Lattice Index and the Relation to Elliptic...
Hecke Operators on Jacobi Forms of Lattice Index and the Relation to Elliptic...
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Digital Signatures: Reassessing security of randomizable signatures
Digital Signatures: Reassessing security of randomizable signaturesDigital Signatures: Reassessing security of randomizable signatures
Digital Signatures: Reassessing security of randomizable signatures
 
Introduction to modern Variational Inference.
Introduction to modern Variational Inference.Introduction to modern Variational Inference.
Introduction to modern Variational Inference.
 
Tensor Train data format for uncertainty quantification
Tensor Train data format for uncertainty quantificationTensor Train data format for uncertainty quantification
Tensor Train data format for uncertainty quantification
 
Auto encoding-variational-bayes
Auto encoding-variational-bayesAuto encoding-variational-bayes
Auto encoding-variational-bayes
 
Comparing estimation algorithms for block clustering models
Comparing estimation algorithms for block clustering modelsComparing estimation algorithms for block clustering models
Comparing estimation algorithms for block clustering models
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
 
Spreading Rumors Quietly and the Subgroup Escape Problem
Spreading Rumors Quietly and the Subgroup Escape ProblemSpreading Rumors Quietly and the Subgroup Escape Problem
Spreading Rumors Quietly and the Subgroup Escape Problem
 
QMC Error SAMSI Tutorial Aug 2017
QMC Error SAMSI Tutorial Aug 2017QMC Error SAMSI Tutorial Aug 2017
QMC Error SAMSI Tutorial Aug 2017
 
Response Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationResponse Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty Quantification
 
Declarative Datalog Debugging for Mere Mortals
Declarative Datalog Debugging for Mere MortalsDeclarative Datalog Debugging for Mere Mortals
Declarative Datalog Debugging for Mere Mortals
 
Number theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-newNumber theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-new
 
1508.07756v1
1508.07756v11508.07756v1
1508.07756v1
 
2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf
2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf
2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

A Signature Scheme as Secure as the Diffie Hellman Problem

  • 1. Theory Seminar - Cryptography A Signature Scheme as Secure as the Diffie Hellman Problem Theory Seminar Eu-Jin Goh and Stanislaw Jarecki Eurocrypt 2003 Subhashini V IIT Madras
  • 2. Theory Seminar - Cryptography Outline 1 Introduction Hard Assumptions 2 Signature Scheme Definition EDL Scheme 3 Security CMA model Unforgeability Forgery Probability 4 References
  • 3. Theory Seminar - Cryptography Introduction Objective of this talk Introduction to Hardness assumption - CDH Reduction techniques ZKP in cryptosystems Random oracle model Signature scheme
  • 4. Theory Seminar - Cryptography Introduction Hard Assumptions Hard Assumption Discrete log problem - Given: g, g a Find: a CDH - Computational Diffie-Hellman - Given: g, g a , g b Compute: g ab Reduction to hard assumption What is tightness?
  • 5. Theory Seminar - Cryptography Signature Scheme Definition Digital Signature Scheme Key Generation - private key (sk) and public key (pk) Sign - Sign(M, sk) → σ Verify - V er(pk, M, σ) Output: Accept or Reject
  • 6. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x
  • 7. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M )
  • 8. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
  • 9. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx 2 NI-ZKP DLh (z) = DLg (y)
  • 10. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx 2 NI-ZKP DLh (z) = DLg (y) 3 k ∈R Zq , u ← g k , v ← hk
  • 11. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx 2 NI-ZKP DLh (z) = DLg (y) 3 k ∈R Zq , u ← g k , v ← hk 4 c ← H (g, h, y, z, u, v) ∈ Zq
  • 12. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx 2 NI-ZKP DLh (z) = DLg (y) 3 k ∈R Zq , u ← g k , v ← hk 4 c ← H (g, h, y, z, u, v) ∈ Zq 5 s ← k + cx
  • 13. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx 2 NI-ZKP DLh (z) = DLg (y) 3 k ∈R Zq , u ← g k , v ← hk 4 c ← H (g, h, y, z, u, v) ∈ Zq 5 s ← k + cx 6 σ ← (z, r, s, c)
  • 14. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx 2 NI-ZKP DLh (z) = DLg (y) 3 k ∈R Zq , u ← g k , v ← hk 4 c ← H (g, h, y, z, u, v) ∈ Zq 5 s ← k + cx 6 σ ← (z, r, s, c) Verify
  • 15. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx 2 NI-ZKP DLh (z) = DLg (y) 3 k ∈R Zq , u ← g k , v ← hk 4 c ← H (g, h, y, z, u, v) ∈ Zq 5 s ← k + cx 6 σ ← (z, r, s, c) Verify h ← H(M, r) , u ← g s y −c , v ← h s z −c
  • 16. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx 2 NI-ZKP DLh (z) = DLg (y) 3 k ∈R Zq , u ← g k , v ← hk 4 c ← H (g, h, y, z, u, v) ∈ Zq 5 s ← k + cx 6 σ ← (z, r, s, c) Verify h ← H(M, r) , u ← g s y −c , v ← h s z −c ? c = H (g, h , y, z, u , v ). Check c = c
  • 17. Theory Seminar - Cryptography Signature Scheme EDL Scheme Proof of equality of DL Replacing ZK-proof of knowledge with just a ZKP k ∈ Zq ; u = g k ; v = hk s = k + cx; g s = uy c ; hs = vz c Also, proof of knowledge of x: g x = y; hx = z x = DLg (y); x = DLh (z) Possible only if c = (k − k )/(x − x) where k = DLg (u) and k = DLh (v)
  • 18. Theory Seminar - Cryptography Security CMA model Security Model Chosen Message Attack (CMA) Adaptive chosen messages. Training with oracles (hash, sign) Adversary A outputs forgery.
  • 19. Theory Seminar - Cryptography Security Unforgeability Unforgeability Random oracle model - solve CDH. (Proof is from [?]) Setup: y = g a (a is unknown) H queries: embed - H(M, r) = h = (g b )d , d - random H queries: all random. Sign queries: r ∈R {0, 1}nr . If H(M, r) is queried - abort. κ ∈R Z . Set, z = y κ , h = g κ and H(M, r) = h DLh (z) = DLg (y) c ∈R Zq , s ∈R Zq ,. Set u = g s y −c and v = hs z −c Store H (g, h, y, z, u, v) = c σ = (z, r, s, c)
  • 20. Theory Seminar - Cryptography Security Forgery Solving CDH Forgery passes verification. h = H(M, r) = g bd DLh (z) = DLg (y) ⇒ z = ha = g abd Output : z 1/d = g ab Solved CDH.
  • 21. Theory Seminar - Cryptography Security Probability Analysis - Probability of solving CDH Abort cases 1 H(M, r) was queried! ⇒ P r = qH 2−nr - Aborting in Step1 of signature P r = qsig · qH · 2−nr 2 Abort at Step4 of signature H (g, g k , y, y k , u, uk ) queried! - Probability of collision (qH + qsig ) · 2−2nq - Final : P r = qsig · (qH + qsig ) · 2−2nq Cannot solve CDH on successful forgery (because of DL) 1 Pr[N H ∧ ¬N Q] = 2−nq 2 Pr[N Q] = qH · 2−nq NH - event that the attacker does not query H-oracle. NQ - event that DLg (y) = DLh (z)
  • 22. Theory Seminar - Cryptography Security Probability We assume that the attacker can break the signature scheme with a non-negligible probability of . Then, if is the probability of challenger(C) solving CDH problem using attacker. = −( abort + DL ) −nr = − qsig · qH · 2 − qsig · (qH + qsig ) · 2−2nq − 2−nq − qH · 2−nq is non-negligible and hence C can solve CDH.
  • 23. Theory Seminar - Cryptography References References I David Chaum, Jan-Hendrik Evertse, and Jeroen Van De Graaf. An improved protocol for demonstrating possession of discrete logarithms and some generalizations. In Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques, EUROCRYPT’87, pages 127–141, Berlin, Heidelberg, 1988. Springer-Verlag. David Chaum and Torben P. Pedersen. Wallet databases with observers. In Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’92, pages 89–105, London, UK, 1993. Springer-Verlag.
  • 24. Theory Seminar - Cryptography References References II Eu-Jin Goh and StanisJarecki. A signature scheme as secure as the diffie-hellman problem. In Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques, EUROCRYPT’03, pages 401–415, Berlin, Heidelberg, 2003. Springer-Verlag.
  • 25. Theory Seminar - Cryptography References Questions? Thank You!