Download presentation
Presentation is loading. Please wait.
1
Digital signatures
2
What is a digital signature
A digital signature allows the holder of the secret key (the signing key) to sign a document Everyone who knows the verification key can verify that the signature is valid (correctness) No one can forge a signature even given the verification key even though he is given a signature
3
Structure of digital signature
πΊππ 1 π β (π π,π£π) ππππ π π π β π ππ ππ π π£π π,π ππ β {0,1}
4
Structure of digital signature scheme (DSS)
πΊππ 1 π β (π π,π£π) ππππ π π π β π ππ ππ π π£π π,π ππ β {0,1} Correctness ππ π π£π π,πππ π π π (π) =1 Unforgeability To be continued
5
DSS VS MAC πΊππ 1 π β (π π,π£π) πΊππ 1 π β π ππππ π π π β π ππ πππ π π β π‘
πΊππ 1 π β (π π,π£π) ππππ π π π β π ππ ππ π π£π π,π ππ β {0,1} πΊππ 1 π β π πππ π π β π‘ vπ π π π,π‘ β {0,1}
6
Mac forgery game M β{} k β π
0,1 π πβ² Mβπβͺ{πβ²} Repeat as many times
as the adversary wants π‘β² βππ π π (πβ²) π‘β² Wins if π βπ π£πππππ¦ π,π‘ =1 (π,π‘)
7
Signature forgery game
π£π M β{} π π,π£πβπΊππ( 1 π ) πβ² Mβπβͺ{πβ²} Repeat as many times as the adversary wants π ππβ² βπππ π π π (πβ²) π ππβ² Wins if π βπ πππππ π¦ π£π π,π ππ =1 (π,π ππ)
8
Definition of signature scheme
Correctness: Pr ππ π π£π π,πππ π π π π =1 π π,π£π βπΊππ 1 π =1 Unforgeability For all PPT adversary π΄, there exists negligible function π, Pr π΄ π€πππ π‘βπ π πππππ‘π’ππ πππππππ¦ ππππ β€π(π)
9
Relation between macs and signatures
Every signature scheme is a message authentication code. A mac scheme is not necessarily a signature. Without the key, it may be impossible to verify a mac.
10
Signatures are expensive
They require public-key operations for each signature you wish to do. Hash functions are relatively cheap
11
Hash and sign Let (πΊππβ²,ππππβ²,ππππππ¦β²) be a signature scheme and let π» be a collision resistant hash function, then the following πΊππ 1 π βπΊπ π β² 1 π πππ π π π π β πππ π π π β² (π» π ) πππππ π¦ π£π π,π ππ β πππππ π¦ π£π β² π» π ,π ππ =1
12
Security of hash and sign
Let (πΊππβ²,ππππβ²,ππππππ¦β²) be a signature scheme and let π» be a collision resistant hash function, then the following πΊππ 1 π βπΊπ π β² 1 π πππ π π π π β πππ π π π β² (π» π ) πππππ π¦ π π π,π ππ β πππππ π¦ β² π» π ,π ππ =1 Essentially the same proof as hash and mac Breaking security of this scheme means Finding a collision Finding a signature on an unsigned message
13
Interesting property of plaintext RSA
π π,ππ βπΎππ¦πΊππ 1 π β πΈπ π ππ π·π π π π π =π Due to the fact that π π π = π π π = π ππ
14
RSA signature scheme Let (πΎππ¦πππ,πΈππ,π·ππ) denote the RSA encryption scheme πΊππ 1 π β{π πβπ π β² , π£πβππβ£ π π β² ,π π β² βπΎππ¦πππ 1 π } πππ π π π π β π·ππ π π π πππππ π¦ π£π π, π ππ β πΈπ π π£π π ππ =π
15
Insecure RSA signature scheme
πΊππ 1 π β{ π£πβππ, π πβπ πβ² β£ π π β² ,π π β² βπΎππ¦πππ 1 π } πππ π π π π β π·ππ π π π πππππ π¦ π£π π,πππ π π π π = πΈπ π π£π π·ππ π π π πΈπ π π£π π·ππ π π π = π π π = π πβ
π =π
16
Secure RSA signature scheme
Assumptions Random oracle π» (Hash function modeled as a random oracle π=ππ where π,π are prime πΊππ 1 π β{ π£πβππ, π πβπ πβ² β£ π π β² ,π π β² βπΎππ¦πππ 1 π } πππ π π π π β π·ππ π π π»(π) πππππ π¦ π£π π,πππ π π π π βπ» π = πΈπ π π£π π·ππ π π π»(π) πΈπ π π£π π·ππ π π π»(π) = (π» (π)) π π πππ π (π» (π)) π π πππ π = π»(π) πβ
π πππ π(π) (πππ π)=π»(π)
17
Schnorr signature scheme
Based on Group G Generator π for G Random oracle π» Discrete logarithm
18
Schnorr signature scheme
Requirement: Group πΊ, πΊ =π, generator π, random oracle π» πΊππ 1 π π π β π
πΊ π£πβ π π π πππππ π¦ π£π (π,π ππ) π,π βπ ππ u β π π β
π£π βπ Output π» π’,π =π πππ π π π π πβ π
π |πΊ| π’β π π πβπ»(π’,π) π βπβ
π π+π (πππ π) Output (π,π )
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.