Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: 361-396 Authors: D. Pointcheval and J. Stern Presented.

Slides:



Advertisements
Similar presentations
1 Chapter 7-2 Signature Schemes. 2 Outline [1] Introduction [2] Security Requirements for Signature Schemes [3] The ElGamal Signature Scheme [4] Variants.
Advertisements

Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Cryptography and Network Security
11 Provable Security. 22 Given a ciphertext, find the corresponding plaintext.
Digital Signatures and Hash Functions. Digital Signatures.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups Masayuki Abe, NTT Jens Groth, University College London Kristiyan Haralambiev, NYU.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Chapter 7-1 Signature Schemes.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Almost uniform density of power residues and the provable security of ESIGN Jacques Stern ASIACRYPT 2003 December 3rd 2003 École normale supérieure Tatsuaki.
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
Chapter 3 Encryption Algorithms & Systems (Part C)
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 4 Data Authentication Part II.
Cryptography and Network Security Chapter 13
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Digital Signatures (DSs) The digital signatures cannot be separated from the message and attached to another The signature is not only tied to signer but.
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Chapter 13 Digital Signature
8. Data Integrity Techniques
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Digital Signatures Applied Handbook of Cryptography: Chapt 11
11 Digital Signature.  Efficiency  Unforgeability : only signer can generate  Not reusable : not to use for other message  Unalterable : No modification.
Bob can sign a message using a digital signature generation algorithm
1 Lect. 15 : Digital Signatures RSA, ElGamal, DSA, KCDSA, Schnorr.
The RSA Algorithm Rocky K. C. Chang, March
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Topic 22: Digital Schemes (2)
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Cryptography Lecture 9 Stefan Dziembowski
Foundations of Cryptography Lecture 6 Lecturer: Moni Naor.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
1 一個新的代理簽章法 A New Proxy Signature Scheme 作 者 : 洪國寶, 許琪慧, 郭淑娟與邱文怡 報 告者 : 郭淑娟.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Chapter 8 Digital Signature Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
Prepared by Dr. Lamiaa Elshenawy
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
S EMINAR P RESENTATION ON N OTIONS OF S ECURITY 1 S M Masud Karim January 18, 2008 Bonn, Germany.
Transitive Signatures based on Factoring and RSA Mihir Bellare (University of California, San Diego, USA) Gregory Neven (Katholieke Universiteit Leuven,
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
 Requirement  Security  Classification  RSA Signature  ElGamal Signature  DSS  Other Signature Schemes  Applied Digital Signatures 11.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
COM 5336 Lecture 8 Digital Signatures
Impossibility proofs for RSA signatures in the standard model Pascal Paillier Topics in Cryptology – CT-RSA 2007.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Cryptography and Network Security Chapter 13
Digital signatures.
Digital Signature Schemes and the Random Oracle Model
Digital Signature Schemes and the Random Oracle Model
Introduction to Modern Cryptography
Digital Signatures.
Chapter 13 Digital Signature
Cryptography Lecture 26.
Presentation transcript:

Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented by J. Liu

Outline Introduction Definitions 1.The random oracle model 2.Digital signature schemes Preliminaries 1. Complexity theory and “Oracle replay attack” 2. Distinguishability of distributions of probability Security arguments for digital signatures

Introduction Provable security has tried to provide proof in the asymptotic framework of complexity theory. That is, poly reductions the problem to well-established problems, such as factorization, DLP, NPC…. One way function  NP vs. P

The random oracle model Hash function (e.g. MD5, SHA1-2, …) long message  short digest. Nonrepudiation  it is impossible to find two different messages providing the same hash value (collision freeness) The hash function can be seen as an oracle which produces a truly random value for each “new” query.

Digital signature schemes 1.Key generation algo. G (probabilistic): input: k and w, output: (Kp, Ks) 2.Signing algo. Σ(may be probabilistic): input: message m, (Kp, Ks) output: signature σ 3.Verification algo. V (not probabilistic): input: m, Kp, σ output: accept or reject

Fig. 1. signature schemes

Example: RSA signature N = pq, ed = 1 mod φ(N) where e is p and d is s. The signature of a message m with respect to d is σ= m d mod N It is not secure under existential forgery. σ’ = σ 2 = (m d ) 2 = (m 2 ) d mod N Not intelligible or without the proper redundancy

Example: Schnorr signature p, q two large prime and q | p-1 with q ≧ 2 k. g  (Z/pZ)* of order q, y = g -x mod p σ= (r, e, s), where r = g K mod p with random K, e = H(m, r) mod q and s =K+ex mod q Verify by e = H(m, g s y e mod p) [g s y e = g K+ex (g -x ) e = g K+ex-ex = g K =r mod p]

No-message attack vs. known- message attack NMA: Attacker only knows public key of the signer. KMA: Attacker can access a list of (m, σ) pairs. 1)Plan known-message attack 2)Generic chosen-message attack 3)Oriented chosen-message attack 4)Adaptively chosen-message attack

Plan known-message attack Attacker has access to a list of signed messages, but he has not chosen them.

Generic chosen-message attack Attacker can choose the list of messages to be signed. This choice must be made before accessing the public key of the signer. That is the choice is independent of the signer.

Oriented chosen-message attack Choose the message for specific signer.

Adaptively chosen-message attack Having knowledge of the public key of the signer, the attacker can ask the signer to sign any message that he wants. He can then adapt his queries according to previous message-signature pairs.

Forgeries Total break: Disclose the secret key of the signer. Universal forgery: Constructing an efficient algorithm which can sign any message. Existential forgery: providing a new message-signature pair. (not dangerous ∵ meaningless)

Secure signature scheme A signature scheme is secure if an existential forgery is computationally impossible, even under an adaptively chosen-message attack.

Preliminaries Complexity theorem and “Oracle replay attack” Distinguishability of distributions of probability

Complexity theorem and “Oracle replay attack” All participants are modeled by probabilistic polynomial time Turing machine. Generic reduction technique. Oracle replay attack: by a polynomial replay of the attacker with different random oracle.Oracle replay attack

 : random tape A query the random oracle Q times,  i is the answer of the i-th query.  +1: the index of Q(m,  1)

Lemmas Splitting lemma Lemma 2 Forking lemma Theorem 2

Splitting lemma

Lemma 2

Forking lemma

Theorem 2

Proof By forking lemma, we obtain 2 valid signatures (m, r, e, s) and (m, r, e’, s’) with e  e’.