SlideShare a Scribd company logo
1 of 14
Download to read offline
3-Move Undeniable Signature Scheme
Advances in Cryptology – EUROCRYPT 2005
Kaoru Kurosawa and Swee-Huay Heng
Ibaraki University, 4-12-1 Nakanarusawa, Hitachi, Ibaraki 316-8511, Japan

Multimedia University, Jalan Ayer Keroh Lama, 75450 Melaka, Malaysia
林彥賓
2021/06/13
The FDH Variant of Chaum’s Scheme
Let be an Abelian group of prime order , and let be a generator of .

We say that is a DH-tuple if .
The DDH problem is to decide if is a DH-tuple.
The CDH problem is to compute from and the DLOG problem is to
compute from .

G q g G
(g, g , g , g )
u v w
w = uv (mod q)
(g, gu, gv, gw)
guv (g, gu, gv)
u gu
2
Unforgeability


The forger wins the game if outputs a valid message-signature pair that has
never been queried
F’s advantage in this game is defined to be wins .
F F m∗
Adv(F) = Pr[F ]
3
Invisibility
4
Impersonation
5
3-move honest verifier zero-knowledge proof system
prover knows u of a DH-tuple




(z ​ =
1 g )(U =
r
g ) =
u c
g =
r+uc
gd
(z ​ =
2 V )(W =
r
V ) =
u c
V =
r+uc
V d 6
prover knows u of a Non DH-tuple




(z ​ =
1 V /W )(A =
α β
(V /W) ) =
u r c
V /W =
α+urc β+cr
z ​
A
1
c
g /U =
d ​
1 d ​
2
g =
α+cur−uβ−cur
g =
α−uβ
z ​
2
7
3-move WI protocol
witness indistinguishable: the verifier cannot tell which witness the prover is using
WI Protocol for DH-Tuple
the prover knows (but not )

u v
8
WI Protocol for Non DH-Tuple
9
Proof of Unforgeability
if there exists an algorithm that solves the CDH problem with advantage
then one can construct a forger that can forge in the universal way with
advantage
Suppose the input to is . M then starts running by feeding with
the public key
simulate random oracle , the signing oracle and the
confirmation/disavowal oracle
Let and be the number of signing queries and queries that issues
respectively. Assume that when requests a signature on a message , it
has already made the corresponding query on
Let be the number of queries that issues to the confirmation/disavowal
oracle
M ϵ ​
M
F
ϵ ​
F
M (g, g , g )
x z
F F
(g, y = g , H)
x
M H
q ​
S qH H F
F m ​
i
H m ​
i
q ​
v F
10
query for a message :
with probability
with probability 

where is chosen randomly from and is a fixed probability
signing query for a message :
If has responded with to the query for a message , then
returns as the valid signature (since ).
Otherwise, aborts and it fails to solve the CDH problem
H m ​
i
h ​ =
i H(m ​
) =
i gv ​
i
δ
h ​ =
i H(m ​
) =
i (g )
z v ​
i
1−δ
v ​
i Z ​
q δ
m ​
i
M h ​ =
i gv ​
i
H m ​
i M
σ =
i yv ​
i
y =
v ​
i
(g ) =
x v ​
i
h ​ =
i
x
H(m ​
)
i
x
M
11
confirmation/disavowal query:
consider that the final output of is the th query
assume a valid message-signature pair queried by F to the
confirmation/disavowal oracle such that mi has never been queried to the signing
oracle
F (q ​ +
v 1)
(m ​
, σ ​
)
i i
′
12
chooses randomly
:
If has never made a signing query for , then returns and runs
the disavowal protocol with
Otherwise, answered with a valid signature with probability (with
probability aborts)
If then returns and runs the confirmation protocol
with
Otherwise, returns and runs the disavowal protocol with
If has queried to the signing oracle, then aborts
otherwise, assume then we have .
Consequently, outputs and thus it solves the CDH
problem. Otherwise, M aborts and it fails to solve the CDH problem
M Guess ∈ {1, 2,⋅⋅⋅, q ​ +
v 1}
i < Guess
F m ​
i M μ = 0
F
M σ ​
i δ
(1−δ)M
σ ​ =
i σ ​
i
′
M μ = 1
F
M μ = 0 F
i = Guess
F m ​
i M
h ​ =
i (g )
z v ​
i
σ ​ =
i h ​ =
i
x
(g )
zv ​
i x
M g =
xz
(σ ​
)
i
1/v ​
i
13
guesses the first special query with probability
The probability that answers to all the signing queries is
outputs with probability
the probability that does not abort during the simulation is
This value is maximized at
This shows that 's advantage is at least
M 1/(q ​ +
v 1)
M δq ​
S
M gzr
1−δ
M δ (1 −
q ​
S
δ)/ q ​ + 1
( v )
δ ​ =
opt 1 − 1/(q ​ +
S 1)
M ϵ ​
M
1 − 1/ q ​ + 1 ) ϵ ​
/ q ​ + 1
(( ( S ))
q ​
−1
S
) F ( v )
14

More Related Content

What's hot

Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
Aadya Vatsa
 
Skiena algorithm 2007 lecture19 introduction to np complete
Skiena algorithm 2007 lecture19 introduction to np completeSkiena algorithm 2007 lecture19 introduction to np complete
Skiena algorithm 2007 lecture19 introduction to np complete
zukun
 
Huffman coding
Huffman codingHuffman coding
Huffman coding
George Ang
 

What's hot (15)

gate-Cs 2000
gate-Cs 2000gate-Cs 2000
gate-Cs 2000
 
Gate Previous Years Papers
Gate Previous Years PapersGate Previous Years Papers
Gate Previous Years Papers
 
linear codes and cyclic codes
linear codes and cyclic codeslinear codes and cyclic codes
linear codes and cyclic codes
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
 
Ch10 2 v1
Ch10 2 v1Ch10 2 v1
Ch10 2 v1
 
Cn lec-06
Cn lec-06Cn lec-06
Cn lec-06
 
104 Icdcit05
104 Icdcit05104 Icdcit05
104 Icdcit05
 
Skiena algorithm 2007 lecture19 introduction to np complete
Skiena algorithm 2007 lecture19 introduction to np completeSkiena algorithm 2007 lecture19 introduction to np complete
Skiena algorithm 2007 lecture19 introduction to np complete
 
Java Puzzlers
Java PuzzlersJava Puzzlers
Java Puzzlers
 
Huffman coding
Huffman codingHuffman coding
Huffman coding
 
How were the first error correcting codes constructed? A historical introduct...
How were the first error correcting codes constructed? A historical introduct...How were the first error correcting codes constructed? A historical introduct...
How were the first error correcting codes constructed? A historical introduct...
 
Huffman coding
Huffman coding Huffman coding
Huffman coding
 
Break and continue statement in C
Break and continue statement in CBreak and continue statement in C
Break and continue statement in C
 
6 games
6 games6 games
6 games
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to 3-Move Undeniable Signature Scheme

Some topics in analysis of boolean functions
Some topics in analysis of boolean functionsSome topics in analysis of boolean functions
Some topics in analysis of boolean functions
guest756c74
 
Divide-and-Conquer & Dynamic ProgrammingDivide-and-Conqu.docx
Divide-and-Conquer & Dynamic ProgrammingDivide-and-Conqu.docxDivide-and-Conquer & Dynamic ProgrammingDivide-and-Conqu.docx
Divide-and-Conquer & Dynamic ProgrammingDivide-and-Conqu.docx
jacksnathalie
 

Similar to 3-Move Undeniable Signature Scheme (9)

Machine Learning, Financial Engineering and Quantitative Investing
Machine Learning, Financial Engineering and Quantitative InvestingMachine Learning, Financial Engineering and Quantitative Investing
Machine Learning, Financial Engineering and Quantitative Investing
 
Some topics in analysis of boolean functions
Some topics in analysis of boolean functionsSome topics in analysis of boolean functions
Some topics in analysis of boolean functions
 
Divide-and-Conquer & Dynamic ProgrammingDivide-and-Conqu.docx
Divide-and-Conquer & Dynamic ProgrammingDivide-and-Conqu.docxDivide-and-Conquer & Dynamic ProgrammingDivide-and-Conqu.docx
Divide-and-Conquer & Dynamic ProgrammingDivide-and-Conqu.docx
 
Can machine think like human being : A Godelian perspective
Can machine think like human being : A Godelian perspective Can machine think like human being : A Godelian perspective
Can machine think like human being : A Godelian perspective
 
02 math essentials
02 math essentials02 math essentials
02 math essentials
 
Gathering Background Knowledge for Story Understanding through Crowdsourcing
 Gathering Background Knowledge for Story Understanding through Crowdsourcing  Gathering Background Knowledge for Story Understanding through Crowdsourcing
Gathering Background Knowledge for Story Understanding through Crowdsourcing
 
ZeroKnowledge Nominative Signatures
ZeroKnowledge Nominative SignaturesZeroKnowledge Nominative Signatures
ZeroKnowledge Nominative Signatures
 
Signature from One-way Functions
Signature from One-way FunctionsSignature from One-way Functions
Signature from One-way Functions
 
Final Report-1-(1)
Final Report-1-(1)Final Report-1-(1)
Final Report-1-(1)
 

More from National Chengchi University

More from National Chengchi University (12)

Distributed key generation protocol with hierarchical threshold access structure
Distributed key generation protocol with hierarchical threshold access structureDistributed key generation protocol with hierarchical threshold access structure
Distributed key generation protocol with hierarchical threshold access structure
 
A Threshold Cryptosystem without a Trusted Party
A Threshold Cryptosystem without a Trusted PartyA Threshold Cryptosystem without a Trusted Party
A Threshold Cryptosystem without a Trusted Party
 
One round threshold ecdsa with identifiable abort
One round threshold ecdsa with identifiable abortOne round threshold ecdsa with identifiable abort
One round threshold ecdsa with identifiable abort
 
Dynamic and verifiable hierarchical secret sharing
Dynamic and verifiable hierarchical secret sharingDynamic and verifiable hierarchical secret sharing
Dynamic and verifiable hierarchical secret sharing
 
User Account Access Graphs
User Account Access GraphsUser Account Access Graphs
User Account Access Graphs
 
Fast Multiparty Threshold ECDSA with Fast TrustlessSetup
Fast Multiparty Threshold ECDSA with Fast TrustlessSetupFast Multiparty Threshold ECDSA with Fast TrustlessSetup
Fast Multiparty Threshold ECDSA with Fast TrustlessSetup
 
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
 
NCCU CPDA Lecture 12 Attribute Based Encryption
NCCU CPDA Lecture 12 Attribute Based EncryptionNCCU CPDA Lecture 12 Attribute Based Encryption
NCCU CPDA Lecture 12 Attribute Based Encryption
 
Pairing for beginneer
Pairing for beginneerPairing for beginneer
Pairing for beginneer
 
Efficient selective id secure identity based encryption without random oracles
Efficient selective id secure identity based encryption without random oraclesEfficient selective id secure identity based encryption without random oracles
Efficient selective id secure identity based encryption without random oracles
 
Forward secure asynchronous messaging from puncturable encryption
Forward secure asynchronous messaging from puncturable encryptionForward secure asynchronous messaging from puncturable encryption
Forward secure asynchronous messaging from puncturable encryption
 
Identity based encryption from the weil pairing
Identity based encryption from the weil pairingIdentity based encryption from the weil pairing
Identity based encryption from the weil pairing
 

Recently uploaded

Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
PirithiRaju
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdf
PirithiRaju
 
development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virus
NazaninKarimi6
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Sérgio Sacani
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdf
 
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
 
development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virus
 
Dubai Call Girls Beauty Face Teen O525547819 Call Girls Dubai Young
Dubai Call Girls Beauty Face Teen O525547819 Call Girls Dubai YoungDubai Call Girls Beauty Face Teen O525547819 Call Girls Dubai Young
Dubai Call Girls Beauty Face Teen O525547819 Call Girls Dubai Young
 
chemical bonding Essentials of Physical Chemistry2.pdf
chemical bonding Essentials of Physical Chemistry2.pdfchemical bonding Essentials of Physical Chemistry2.pdf
chemical bonding Essentials of Physical Chemistry2.pdf
 
Sector 62, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort ServiceCall Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts ServiceJustdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 

3-Move Undeniable Signature Scheme

  • 1. 3-Move Undeniable Signature Scheme Advances in Cryptology – EUROCRYPT 2005 Kaoru Kurosawa and Swee-Huay Heng Ibaraki University, 4-12-1 Nakanarusawa, Hitachi, Ibaraki 316-8511, Japan Multimedia University, Jalan Ayer Keroh Lama, 75450 Melaka, Malaysia 林彥賓 2021/06/13
  • 2. The FDH Variant of Chaum’s Scheme Let be an Abelian group of prime order , and let be a generator of . We say that is a DH-tuple if . The DDH problem is to decide if is a DH-tuple. The CDH problem is to compute from and the DLOG problem is to compute from . G q g G (g, g , g , g ) u v w w = uv (mod q) (g, gu, gv, gw) guv (g, gu, gv) u gu 2
  • 3. Unforgeability The forger wins the game if outputs a valid message-signature pair that has never been queried F’s advantage in this game is defined to be wins . F F m∗ Adv(F) = Pr[F ] 3
  • 6. 3-move honest verifier zero-knowledge proof system prover knows u of a DH-tuple (z ​ = 1 g )(U = r g ) = u c g = r+uc gd (z ​ = 2 V )(W = r V ) = u c V = r+uc V d 6
  • 7. prover knows u of a Non DH-tuple (z ​ = 1 V /W )(A = α β (V /W) ) = u r c V /W = α+urc β+cr z ​ A 1 c g /U = d ​ 1 d ​ 2 g = α+cur−uβ−cur g = α−uβ z ​ 2 7
  • 8. 3-move WI protocol witness indistinguishable: the verifier cannot tell which witness the prover is using WI Protocol for DH-Tuple the prover knows (but not ) u v 8
  • 9. WI Protocol for Non DH-Tuple 9
  • 10. Proof of Unforgeability if there exists an algorithm that solves the CDH problem with advantage then one can construct a forger that can forge in the universal way with advantage Suppose the input to is . M then starts running by feeding with the public key simulate random oracle , the signing oracle and the confirmation/disavowal oracle Let and be the number of signing queries and queries that issues respectively. Assume that when requests a signature on a message , it has already made the corresponding query on Let be the number of queries that issues to the confirmation/disavowal oracle M ϵ ​ M F ϵ ​ F M (g, g , g ) x z F F (g, y = g , H) x M H q ​ S qH H F F m ​ i H m ​ i q ​ v F 10
  • 11. query for a message : with probability with probability where is chosen randomly from and is a fixed probability signing query for a message : If has responded with to the query for a message , then returns as the valid signature (since ). Otherwise, aborts and it fails to solve the CDH problem H m ​ i h ​ = i H(m ​ ) = i gv ​ i δ h ​ = i H(m ​ ) = i (g ) z v ​ i 1−δ v ​ i Z ​ q δ m ​ i M h ​ = i gv ​ i H m ​ i M σ = i yv ​ i y = v ​ i (g ) = x v ​ i h ​ = i x H(m ​ ) i x M 11
  • 12. confirmation/disavowal query: consider that the final output of is the th query assume a valid message-signature pair queried by F to the confirmation/disavowal oracle such that mi has never been queried to the signing oracle F (q ​ + v 1) (m ​ , σ ​ ) i i ′ 12
  • 13. chooses randomly : If has never made a signing query for , then returns and runs the disavowal protocol with Otherwise, answered with a valid signature with probability (with probability aborts) If then returns and runs the confirmation protocol with Otherwise, returns and runs the disavowal protocol with If has queried to the signing oracle, then aborts otherwise, assume then we have . Consequently, outputs and thus it solves the CDH problem. Otherwise, M aborts and it fails to solve the CDH problem M Guess ∈ {1, 2,⋅⋅⋅, q ​ + v 1} i < Guess F m ​ i M μ = 0 F M σ ​ i δ (1−δ)M σ ​ = i σ ​ i ′ M μ = 1 F M μ = 0 F i = Guess F m ​ i M h ​ = i (g ) z v ​ i σ ​ = i h ​ = i x (g ) zv ​ i x M g = xz (σ ​ ) i 1/v ​ i 13
  • 14. guesses the first special query with probability The probability that answers to all the signing queries is outputs with probability the probability that does not abort during the simulation is This value is maximized at This shows that 's advantage is at least M 1/(q ​ + v 1) M δq ​ S M gzr 1−δ M δ (1 − q ​ S δ)/ q ​ + 1 ( v ) δ ​ = opt 1 − 1/(q ​ + S 1) M ϵ ​ M 1 − 1/ q ​ + 1 ) ϵ ​ / q ​ + 1 (( ( S )) q ​ −1 S ) F ( v ) 14