Security Proofs for Signature Schemes

Security Proofs for Signature Schemes

1996 | David Pointcheval, Jacques Stern
This paper presents security proofs for signature schemes in the random oracle model. The authors establish the generality of this technique against adaptively chosen message attacks. They demonstrate the security of a variant of the El Gamal signature scheme, where committed values are hashed with the message. This is surprising since the original El Gamal scheme is vulnerable to existential forgery. The paper discusses the framework of signature schemes, including key generation, signing, and verification algorithms. It defines two types of attacks: no-message and adaptively chosen message attacks. The random oracle model is introduced, where hash functions are treated as random oracles. The forking lemma is introduced as a key tool for proving security. It allows the derivation of two valid signatures from a single one, leading to a contradiction if the underlying problem is hard. The lemma is applied to prove the security of the Fiat-Shamir signature scheme against no-message attacks. The paper also proves the security of a modified El Gamal signature scheme against adaptively chosen message attacks. This scheme uses a hash function to hash the message and a random value before signing. The security proof relies on the hardness of the discrete logarithm problem under certain conditions. The authors show that if an adversary can forge a signature in the random oracle model, then the discrete logarithm problem can be solved in polynomial time. This result applies to various signature schemes derived from zero-knowledge identification protocols. The paper concludes with further results, including the security of the Schnorr signature scheme under adaptively chosen message attacks.This paper presents security proofs for signature schemes in the random oracle model. The authors establish the generality of this technique against adaptively chosen message attacks. They demonstrate the security of a variant of the El Gamal signature scheme, where committed values are hashed with the message. This is surprising since the original El Gamal scheme is vulnerable to existential forgery. The paper discusses the framework of signature schemes, including key generation, signing, and verification algorithms. It defines two types of attacks: no-message and adaptively chosen message attacks. The random oracle model is introduced, where hash functions are treated as random oracles. The forking lemma is introduced as a key tool for proving security. It allows the derivation of two valid signatures from a single one, leading to a contradiction if the underlying problem is hard. The lemma is applied to prove the security of the Fiat-Shamir signature scheme against no-message attacks. The paper also proves the security of a modified El Gamal signature scheme against adaptively chosen message attacks. This scheme uses a hash function to hash the message and a random value before signing. The security proof relies on the hardness of the discrete logarithm problem under certain conditions. The authors show that if an adversary can forge a signature in the random oracle model, then the discrete logarithm problem can be solved in polynomial time. This result applies to various signature schemes derived from zero-knowledge identification protocols. The paper concludes with further results, including the security of the Schnorr signature scheme under adaptively chosen message attacks.
Reach us at info@study.space
[slides] Security Proofs for Signature Schemes | StudySpace