SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
Theory Seminar - Cryptography




               A Signature Scheme as Secure as the Diffie
                           Hellman Problem
                                        Theory Seminar


                                Eu-Jin Goh and Stanislaw Jarecki
                                        Eurocrypt 2003

                                          Subhashini V
                                           IIT Madras
Theory Seminar - Cryptography




Outline

       1 Introduction
               Hard Assumptions

       2 Signature Scheme
               Definition
               EDL Scheme

       3 Security
               CMA model
               Unforgeability
               Forgery
               Probability

       4 References
Theory Seminar - Cryptography
  Introduction




Objective of this talk



      Introduction to
                 Hardness assumption - CDH
                 Reduction techniques
                 ZKP in cryptosystems
                 Random oracle model
                 Signature scheme
Theory Seminar - Cryptography
  Introduction
     Hard Assumptions




                 Hard Assumption
                 Discrete log problem
                 - Given: g, g a         Find: a
                 CDH - Computational Diffie-Hellman
                 - Given: g, g a , g b   Compute: g ab
                 Reduction to hard assumption
                 What is tightness?
Theory Seminar - Cryptography
  Signature Scheme
     Definition



Digital Signature Scheme




                 Key Generation - private key (sk) and public key (pk)
                 Sign - Sign(M, sk) → σ
                 Verify - V er(pk, M, σ) Output: Accept or Reject
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
                  2   NI-ZKP DLh (z) = DLg (y)
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
                  2   NI-ZKP DLh (z) = DLg (y)
                  3   k ∈R Zq , u ← g k , v ← hk
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
                  2   NI-ZKP DLh (z) = DLg (y)
                  3   k ∈R Zq , u ← g k , v ← hk
                  4   c ← H (g, h, y, z, u, v) ∈ Zq
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
                  2   NI-ZKP DLh (z) = DLg (y)
                  3   k ∈R Zq , u ← g k , v ← hk
                  4   c ← H (g, h, y, z, u, v) ∈ Zq
                  5   s ← k + cx
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
                  2   NI-ZKP DLh (z) = DLg (y)
                  3   k ∈R Zq , u ← g k , v ← hk
                  4   c ← H (g, h, y, z, u, v) ∈ Zq
                  5   s ← k + cx
                  6   σ ← (z, r, s, c)
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
                  2   NI-ZKP DLh (z) = DLg (y)
                  3   k ∈R Zq , u ← g k , v ← hk
                  4   c ← H (g, h, y, z, u, v) ∈ Zq
                  5   s ← k + cx
                  6   σ ← (z, r, s, c)
              Verify
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
                  2   NI-ZKP DLh (z) = DLg (y)
                  3   k ∈R Zq , u ← g k , v ← hk
                  4   c ← H (g, h, y, z, u, v) ∈ Zq
                  5   s ← k + cx
                  6   σ ← (z, r, s, c)
              Verify
                      h ← H(M, r) , u ← g s y −c , v ← h s z −c
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



EDL Signature scheme
      Proposed originally by [CEVDG88] and [CP93].
              Key-generation
              sk = x ∈R Zq , pk = y ← g x
              Sign(x, M )
                  1   r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
                  2   NI-ZKP DLh (z) = DLg (y)
                  3   k ∈R Zq , u ← g k , v ← hk
                  4   c ← H (g, h, y, z, u, v) ∈ Zq
                  5   s ← k + cx
                  6   σ ← (z, r, s, c)
              Verify
                      h ← H(M, r) , u ← g s y −c , v ← h s z −c
                                                          ?
                      c = H (g, h , y, z, u , v ). Check c = c
Theory Seminar - Cryptography
  Signature Scheme
     EDL Scheme



Proof of equality of DL


      Replacing ZK-proof of knowledge with just a ZKP
              k ∈ Zq ; u = g k ; v = hk
              s = k + cx; g s = uy c ; hs = vz c
              Also, proof of knowledge of x: g x = y; hx = z
              x = DLg (y); x = DLh (z)
              Possible only if c = (k − k )/(x − x)
                  where k = DLg (u) and k = DLh (v)
Theory Seminar - Cryptography
  Security
     CMA model



Security Model




      Chosen Message Attack (CMA)
              Adaptive chosen messages.
              Training with oracles (hash, sign)
              Adversary A outputs forgery.
Theory Seminar - Cryptography
  Security
     Unforgeability



Unforgeability

      Random oracle model - solve CDH. (Proof is from [?])
              Setup: y = g a (a is unknown)
              H queries: embed - H(M, r) = h = (g b )d , d - random
              H queries: all random.
              Sign queries:
                      r ∈R {0, 1}nr . If H(M, r) is queried - abort.
                      κ ∈R Z . Set, z = y κ , h = g κ and H(M, r) = h
                      DLh (z) = DLg (y)
                      c ∈R Zq , s ∈R Zq ,. Set u = g s y −c and v = hs z −c
                      Store H (g, h, y, z, u, v) = c
                      σ = (z, r, s, c)
Theory Seminar - Cryptography
  Security
     Forgery



Solving CDH



      Forgery passes verification.
               h = H(M, r) = g bd
               DLh (z) = DLg (y) ⇒ z = ha = g abd
               Output : z 1/d = g ab
      Solved CDH.
Theory Seminar - Cryptography
  Security
     Probability



Analysis - Probability of solving CDH

      Abort cases
             1   H(M, r) was queried! ⇒ P r = qH 2−nr
                 - Aborting in Step1 of signature P r = qsig · qH · 2−nr
             2   Abort at Step4 of signature H (g, g k , y, y k , u, uk ) queried!
                 - Probability of collision (qH + qsig ) · 2−2nq
                 - Final : P r = qsig · (qH + qsig ) · 2−2nq
      Cannot solve CDH on successful forgery (because of DL)
             1   Pr[N H ∧ ¬N Q] = 2−nq
             2   Pr[N Q] = qH · 2−nq

      NH - event that the attacker does not query H-oracle.
      NQ - event that DLg (y) = DLh (z)
Theory Seminar - Cryptography
  Security
     Probability




      We assume that the attacker can break the signature scheme with
      a non-negligible probability of .
      Then, if is the probability of challenger(C) solving CDH problem
      using attacker.


                   = −(         abort   +   DL )
                                             −nr
                   = − qsig · qH · 2               − qsig · (qH + qsig ) · 2−2nq
                                                                     − 2−nq − qH · 2−nq

             is non-negligible and hence C can solve CDH.
Theory Seminar - Cryptography
  References




References I


               David Chaum, Jan-Hendrik Evertse, and Jeroen Van De Graaf.
               An improved protocol for demonstrating possession of discrete
               logarithms and some generalizations. In Proceedings of the 6th
               annual international conference on Theory and application of
               cryptographic techniques, EUROCRYPT’87, pages 127–141,
               Berlin, Heidelberg, 1988. Springer-Verlag.
               David Chaum and Torben P. Pedersen. Wallet databases with
               observers. In Proceedings of the 12th Annual International
               Cryptology Conference on Advances in Cryptology, CRYPTO
               ’92, pages 89–105, London, UK, 1993. Springer-Verlag.
Theory Seminar - Cryptography
  References




References II




               Eu-Jin Goh and StanisJarecki. A signature scheme as secure as
               the diffie-hellman problem. In Proceedings of the 22nd
               international conference on Theory and applications of
               cryptographic techniques, EUROCRYPT’03, pages 401–415,
               Berlin, Heidelberg, 2003. Springer-Verlag.
Theory Seminar - Cryptography
  References




Questions?




                                Thank You!

Contenu connexe

Tendances

04 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x204 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x2MuradAmn
 
Information in the Weights
Information in the WeightsInformation in the Weights
Information in the WeightsMark Chang
 
Discrete Logarithm Problem over Prime Fields, Non-canonical Lifts and Logarit...
Discrete Logarithm Problem over Prime Fields, Non-canonical Lifts and Logarit...Discrete Logarithm Problem over Prime Fields, Non-canonical Lifts and Logarit...
Discrete Logarithm Problem over Prime Fields, Non-canonical Lifts and Logarit...PadmaGadiyar
 
Accelerating Collapsed Variational Bayesian Inference for Latent Dirichlet Al...
Accelerating Collapsed Variational Bayesian Inference for Latent Dirichlet Al...Accelerating Collapsed Variational Bayesian Inference for Latent Dirichlet Al...
Accelerating Collapsed Variational Bayesian Inference for Latent Dirichlet Al...Tomonari Masada
 
Modeling the Dynamics of SGD by Stochastic Differential Equation
Modeling the Dynamics of SGD by Stochastic Differential EquationModeling the Dynamics of SGD by Stochastic Differential Equation
Modeling the Dynamics of SGD by Stochastic Differential EquationMark Chang
 
CrystalBall - Compute Relative Frequency in Hadoop
CrystalBall - Compute Relative Frequency in Hadoop CrystalBall - Compute Relative Frequency in Hadoop
CrystalBall - Compute Relative Frequency in Hadoop Suvash Shah
 
snarks <3 hash functions
snarks <3 hash functionssnarks <3 hash functions
snarks <3 hash functionsRebekah Mercer
 
Lecture4 kenrels functions_rkhs
Lecture4 kenrels functions_rkhsLecture4 kenrels functions_rkhs
Lecture4 kenrels functions_rkhsStéphane Canu
 
On generalized dislocated quasi metrics
On generalized dislocated quasi metricsOn generalized dislocated quasi metrics
On generalized dislocated quasi metricsAlexander Decker
 
11.on generalized dislocated quasi metrics
11.on generalized dislocated quasi metrics11.on generalized dislocated quasi metrics
11.on generalized dislocated quasi metricsAlexander Decker
 
My presentation at University of Nottingham "Fast low-rank methods for solvin...
My presentation at University of Nottingham "Fast low-rank methods for solvin...My presentation at University of Nottingham "Fast low-rank methods for solvin...
My presentation at University of Nottingham "Fast low-rank methods for solvin...Alexander Litvinenko
 
Discrete Models in Computer Vision
Discrete Models in Computer VisionDiscrete Models in Computer Vision
Discrete Models in Computer VisionYap Wooi Hen
 
On Nets and Meshes
On Nets and MeshesOn Nets and Meshes
On Nets and MeshesDon Sheehy
 
Aaex7 group2(中英夾雜)
Aaex7 group2(中英夾雜)Aaex7 group2(中英夾雜)
Aaex7 group2(中英夾雜)Shiang-Yun Yang
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate providerKishankant Yadav
 
Datastructure tree
Datastructure treeDatastructure tree
Datastructure treerantd
 
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...Alex Pruden
 
Least squares support Vector Machine Classifier
Least squares support Vector Machine ClassifierLeast squares support Vector Machine Classifier
Least squares support Vector Machine ClassifierRaj Sikarwar
 

Tendances (20)

04 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x204 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x2
 
Information in the Weights
Information in the WeightsInformation in the Weights
Information in the Weights
 
Nominal Schema DL 2011
Nominal Schema DL 2011Nominal Schema DL 2011
Nominal Schema DL 2011
 
Discrete Logarithm Problem over Prime Fields, Non-canonical Lifts and Logarit...
Discrete Logarithm Problem over Prime Fields, Non-canonical Lifts and Logarit...Discrete Logarithm Problem over Prime Fields, Non-canonical Lifts and Logarit...
Discrete Logarithm Problem over Prime Fields, Non-canonical Lifts and Logarit...
 
Accelerating Collapsed Variational Bayesian Inference for Latent Dirichlet Al...
Accelerating Collapsed Variational Bayesian Inference for Latent Dirichlet Al...Accelerating Collapsed Variational Bayesian Inference for Latent Dirichlet Al...
Accelerating Collapsed Variational Bayesian Inference for Latent Dirichlet Al...
 
Modeling the Dynamics of SGD by Stochastic Differential Equation
Modeling the Dynamics of SGD by Stochastic Differential EquationModeling the Dynamics of SGD by Stochastic Differential Equation
Modeling the Dynamics of SGD by Stochastic Differential Equation
 
CrystalBall - Compute Relative Frequency in Hadoop
CrystalBall - Compute Relative Frequency in Hadoop CrystalBall - Compute Relative Frequency in Hadoop
CrystalBall - Compute Relative Frequency in Hadoop
 
snarks <3 hash functions
snarks <3 hash functionssnarks <3 hash functions
snarks <3 hash functions
 
Lecture4 kenrels functions_rkhs
Lecture4 kenrels functions_rkhsLecture4 kenrels functions_rkhs
Lecture4 kenrels functions_rkhs
 
On generalized dislocated quasi metrics
On generalized dislocated quasi metricsOn generalized dislocated quasi metrics
On generalized dislocated quasi metrics
 
11.on generalized dislocated quasi metrics
11.on generalized dislocated quasi metrics11.on generalized dislocated quasi metrics
11.on generalized dislocated quasi metrics
 
My presentation at University of Nottingham "Fast low-rank methods for solvin...
My presentation at University of Nottingham "Fast low-rank methods for solvin...My presentation at University of Nottingham "Fast low-rank methods for solvin...
My presentation at University of Nottingham "Fast low-rank methods for solvin...
 
Discrete Models in Computer Vision
Discrete Models in Computer VisionDiscrete Models in Computer Vision
Discrete Models in Computer Vision
 
On Nets and Meshes
On Nets and MeshesOn Nets and Meshes
On Nets and Meshes
 
Aaex7 group2(中英夾雜)
Aaex7 group2(中英夾雜)Aaex7 group2(中英夾雜)
Aaex7 group2(中英夾雜)
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate provider
 
Datastructure tree
Datastructure treeDatastructure tree
Datastructure tree
 
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
 
ICME 2013
ICME 2013ICME 2013
ICME 2013
 
Least squares support Vector Machine Classifier
Least squares support Vector Machine ClassifierLeast squares support Vector Machine Classifier
Least squares support Vector Machine Classifier
 

En vedette

En vedette (14)

Report on Free space optics
Report on Free space opticsReport on Free space optics
Report on Free space optics
 
Free space optics
Free space opticsFree space optics
Free space optics
 
Report Cryptography
Report CryptographyReport Cryptography
Report Cryptography
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
 
Free space optics
Free space opticsFree space optics
Free space optics
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Free space optical communication
Free space optical communicationFree space optical communication
Free space optical communication
 
Free space optical communication
Free space optical communicationFree space optical communication
Free space optical communication
 
Free space optics (fso) seminar report full
Free space optics (fso) seminar report fullFree space optics (fso) seminar report full
Free space optics (fso) seminar report full
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similaire à A Signature Scheme as Secure as the Diffie Hellman Problem

Quantum Machine Learning and QEM for Gaussian mixture models (Alessandro Luongo)
Quantum Machine Learning and QEM for Gaussian mixture models (Alessandro Luongo)Quantum Machine Learning and QEM for Gaussian mixture models (Alessandro Luongo)
Quantum Machine Learning and QEM for Gaussian mixture models (Alessandro Luongo)MeetupDataScienceRoma
 
Decision Making with Hierarchical Credal Sets (IPMU 2014)
Decision Making with Hierarchical Credal Sets (IPMU 2014)Decision Making with Hierarchical Credal Sets (IPMU 2014)
Decision Making with Hierarchical Credal Sets (IPMU 2014)Alessandro Antonucci
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionVictor Pereira
 
Error control coding bch, reed-solomon etc..
Error control coding   bch, reed-solomon etc..Error control coding   bch, reed-solomon etc..
Error control coding bch, reed-solomon etc..Madhumita Tamhane
 
Hecke Operators on Jacobi Forms of Lattice Index and the Relation to Elliptic...
Hecke Operators on Jacobi Forms of Lattice Index and the Relation to Elliptic...Hecke Operators on Jacobi Forms of Lattice Index and the Relation to Elliptic...
Hecke Operators on Jacobi Forms of Lattice Index and the Relation to Elliptic...Ali Ajouz
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionGöktuğ Serez
 
Digital Signatures: Reassessing security of randomizable signatures
Digital Signatures: Reassessing security of randomizable signaturesDigital Signatures: Reassessing security of randomizable signatures
Digital Signatures: Reassessing security of randomizable signaturesPriyanka Aash
 
Introduction to modern Variational Inference.
Introduction to modern Variational Inference.Introduction to modern Variational Inference.
Introduction to modern Variational Inference.Tomasz Kusmierczyk
 
Tensor Train data format for uncertainty quantification
Tensor Train data format for uncertainty quantificationTensor Train data format for uncertainty quantification
Tensor Train data format for uncertainty quantificationAlexander Litvinenko
 
Auto encoding-variational-bayes
Auto encoding-variational-bayesAuto encoding-variational-bayes
Auto encoding-variational-bayesmehdi Cherti
 
Comparing estimation algorithms for block clustering models
Comparing estimation algorithms for block clustering modelsComparing estimation algorithms for block clustering models
Comparing estimation algorithms for block clustering modelsBigMC
 
Spreading Rumors Quietly and the Subgroup Escape Problem
Spreading Rumors Quietly and the Subgroup Escape ProblemSpreading Rumors Quietly and the Subgroup Escape Problem
Spreading Rumors Quietly and the Subgroup Escape ProblemAleksandr Yampolskiy
 
QMC Error SAMSI Tutorial Aug 2017
QMC Error SAMSI Tutorial Aug 2017QMC Error SAMSI Tutorial Aug 2017
QMC Error SAMSI Tutorial Aug 2017Fred J. Hickernell
 
Response Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationResponse Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationAlexander Litvinenko
 
Declarative Datalog Debugging for Mere Mortals
Declarative Datalog Debugging for Mere MortalsDeclarative Datalog Debugging for Mere Mortals
Declarative Datalog Debugging for Mere MortalsBertram Ludäscher
 
Number theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-newNumber theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-newChristos Loizos
 
2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf
2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf
2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdfAdvanced-Concepts-Team
 

Similaire à A Signature Scheme as Secure as the Diffie Hellman Problem (20)

Quantum Machine Learning and QEM for Gaussian mixture models (Alessandro Luongo)
Quantum Machine Learning and QEM for Gaussian mixture models (Alessandro Luongo)Quantum Machine Learning and QEM for Gaussian mixture models (Alessandro Luongo)
Quantum Machine Learning and QEM for Gaussian mixture models (Alessandro Luongo)
 
Decision Making with Hierarchical Credal Sets (IPMU 2014)
Decision Making with Hierarchical Credal Sets (IPMU 2014)Decision Making with Hierarchical Credal Sets (IPMU 2014)
Decision Making with Hierarchical Credal Sets (IPMU 2014)
 
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Error control coding bch, reed-solomon etc..
Error control coding   bch, reed-solomon etc..Error control coding   bch, reed-solomon etc..
Error control coding bch, reed-solomon etc..
 
Hecke Operators on Jacobi Forms of Lattice Index and the Relation to Elliptic...
Hecke Operators on Jacobi Forms of Lattice Index and the Relation to Elliptic...Hecke Operators on Jacobi Forms of Lattice Index and the Relation to Elliptic...
Hecke Operators on Jacobi Forms of Lattice Index and the Relation to Elliptic...
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Digital Signatures: Reassessing security of randomizable signatures
Digital Signatures: Reassessing security of randomizable signaturesDigital Signatures: Reassessing security of randomizable signatures
Digital Signatures: Reassessing security of randomizable signatures
 
Introduction to modern Variational Inference.
Introduction to modern Variational Inference.Introduction to modern Variational Inference.
Introduction to modern Variational Inference.
 
Tensor Train data format for uncertainty quantification
Tensor Train data format for uncertainty quantificationTensor Train data format for uncertainty quantification
Tensor Train data format for uncertainty quantification
 
Auto encoding-variational-bayes
Auto encoding-variational-bayesAuto encoding-variational-bayes
Auto encoding-variational-bayes
 
Comparing estimation algorithms for block clustering models
Comparing estimation algorithms for block clustering modelsComparing estimation algorithms for block clustering models
Comparing estimation algorithms for block clustering models
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
 
Spreading Rumors Quietly and the Subgroup Escape Problem
Spreading Rumors Quietly and the Subgroup Escape ProblemSpreading Rumors Quietly and the Subgroup Escape Problem
Spreading Rumors Quietly and the Subgroup Escape Problem
 
QMC Error SAMSI Tutorial Aug 2017
QMC Error SAMSI Tutorial Aug 2017QMC Error SAMSI Tutorial Aug 2017
QMC Error SAMSI Tutorial Aug 2017
 
Response Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationResponse Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty Quantification
 
Declarative Datalog Debugging for Mere Mortals
Declarative Datalog Debugging for Mere MortalsDeclarative Datalog Debugging for Mere Mortals
Declarative Datalog Debugging for Mere Mortals
 
Number theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-newNumber theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-new
 
1508.07756v1
1508.07756v11508.07756v1
1508.07756v1
 
2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf
2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf
2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf
 

Dernier

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Dernier (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

A Signature Scheme as Secure as the Diffie Hellman Problem

  • 1. Theory Seminar - Cryptography A Signature Scheme as Secure as the Diffie Hellman Problem Theory Seminar Eu-Jin Goh and Stanislaw Jarecki Eurocrypt 2003 Subhashini V IIT Madras
  • 2. Theory Seminar - Cryptography Outline 1 Introduction Hard Assumptions 2 Signature Scheme Definition EDL Scheme 3 Security CMA model Unforgeability Forgery Probability 4 References
  • 3. Theory Seminar - Cryptography Introduction Objective of this talk Introduction to Hardness assumption - CDH Reduction techniques ZKP in cryptosystems Random oracle model Signature scheme
  • 4. Theory Seminar - Cryptography Introduction Hard Assumptions Hard Assumption Discrete log problem - Given: g, g a Find: a CDH - Computational Diffie-Hellman - Given: g, g a , g b Compute: g ab Reduction to hard assumption What is tightness?
  • 5. Theory Seminar - Cryptography Signature Scheme Definition Digital Signature Scheme Key Generation - private key (sk) and public key (pk) Sign - Sign(M, sk) → σ Verify - V er(pk, M, σ) Output: Accept or Reject
  • 6. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x
  • 7. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M )
  • 8. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx
  • 9. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx 2 NI-ZKP DLh (z) = DLg (y)
  • 10. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx 2 NI-ZKP DLh (z) = DLg (y) 3 k ∈R Zq , u ← g k , v ← hk
  • 11. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx 2 NI-ZKP DLh (z) = DLg (y) 3 k ∈R Zq , u ← g k , v ← hk 4 c ← H (g, h, y, z, u, v) ∈ Zq
  • 12. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx 2 NI-ZKP DLh (z) = DLg (y) 3 k ∈R Zq , u ← g k , v ← hk 4 c ← H (g, h, y, z, u, v) ∈ Zq 5 s ← k + cx
  • 13. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx 2 NI-ZKP DLh (z) = DLg (y) 3 k ∈R Zq , u ← g k , v ← hk 4 c ← H (g, h, y, z, u, v) ∈ Zq 5 s ← k + cx 6 σ ← (z, r, s, c)
  • 14. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx 2 NI-ZKP DLh (z) = DLg (y) 3 k ∈R Zq , u ← g k , v ← hk 4 c ← H (g, h, y, z, u, v) ∈ Zq 5 s ← k + cx 6 σ ← (z, r, s, c) Verify
  • 15. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx 2 NI-ZKP DLh (z) = DLg (y) 3 k ∈R Zq , u ← g k , v ← hk 4 c ← H (g, h, y, z, u, v) ∈ Zq 5 s ← k + cx 6 σ ← (z, r, s, c) Verify h ← H(M, r) , u ← g s y −c , v ← h s z −c
  • 16. Theory Seminar - Cryptography Signature Scheme EDL Scheme EDL Signature scheme Proposed originally by [CEVDG88] and [CP93]. Key-generation sk = x ∈R Zq , pk = y ← g x Sign(x, M ) 1 r ∈R {0, 1}nr , h ← H(M, r) , z ← hx 2 NI-ZKP DLh (z) = DLg (y) 3 k ∈R Zq , u ← g k , v ← hk 4 c ← H (g, h, y, z, u, v) ∈ Zq 5 s ← k + cx 6 σ ← (z, r, s, c) Verify h ← H(M, r) , u ← g s y −c , v ← h s z −c ? c = H (g, h , y, z, u , v ). Check c = c
  • 17. Theory Seminar - Cryptography Signature Scheme EDL Scheme Proof of equality of DL Replacing ZK-proof of knowledge with just a ZKP k ∈ Zq ; u = g k ; v = hk s = k + cx; g s = uy c ; hs = vz c Also, proof of knowledge of x: g x = y; hx = z x = DLg (y); x = DLh (z) Possible only if c = (k − k )/(x − x) where k = DLg (u) and k = DLh (v)
  • 18. Theory Seminar - Cryptography Security CMA model Security Model Chosen Message Attack (CMA) Adaptive chosen messages. Training with oracles (hash, sign) Adversary A outputs forgery.
  • 19. Theory Seminar - Cryptography Security Unforgeability Unforgeability Random oracle model - solve CDH. (Proof is from [?]) Setup: y = g a (a is unknown) H queries: embed - H(M, r) = h = (g b )d , d - random H queries: all random. Sign queries: r ∈R {0, 1}nr . If H(M, r) is queried - abort. κ ∈R Z . Set, z = y κ , h = g κ and H(M, r) = h DLh (z) = DLg (y) c ∈R Zq , s ∈R Zq ,. Set u = g s y −c and v = hs z −c Store H (g, h, y, z, u, v) = c σ = (z, r, s, c)
  • 20. Theory Seminar - Cryptography Security Forgery Solving CDH Forgery passes verification. h = H(M, r) = g bd DLh (z) = DLg (y) ⇒ z = ha = g abd Output : z 1/d = g ab Solved CDH.
  • 21. Theory Seminar - Cryptography Security Probability Analysis - Probability of solving CDH Abort cases 1 H(M, r) was queried! ⇒ P r = qH 2−nr - Aborting in Step1 of signature P r = qsig · qH · 2−nr 2 Abort at Step4 of signature H (g, g k , y, y k , u, uk ) queried! - Probability of collision (qH + qsig ) · 2−2nq - Final : P r = qsig · (qH + qsig ) · 2−2nq Cannot solve CDH on successful forgery (because of DL) 1 Pr[N H ∧ ¬N Q] = 2−nq 2 Pr[N Q] = qH · 2−nq NH - event that the attacker does not query H-oracle. NQ - event that DLg (y) = DLh (z)
  • 22. Theory Seminar - Cryptography Security Probability We assume that the attacker can break the signature scheme with a non-negligible probability of . Then, if is the probability of challenger(C) solving CDH problem using attacker. = −( abort + DL ) −nr = − qsig · qH · 2 − qsig · (qH + qsig ) · 2−2nq − 2−nq − qH · 2−nq is non-negligible and hence C can solve CDH.
  • 23. Theory Seminar - Cryptography References References I David Chaum, Jan-Hendrik Evertse, and Jeroen Van De Graaf. An improved protocol for demonstrating possession of discrete logarithms and some generalizations. In Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques, EUROCRYPT’87, pages 127–141, Berlin, Heidelberg, 1988. Springer-Verlag. David Chaum and Torben P. Pedersen. Wallet databases with observers. In Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’92, pages 89–105, London, UK, 1993. Springer-Verlag.
  • 24. Theory Seminar - Cryptography References References II Eu-Jin Goh and StanisJarecki. A signature scheme as secure as the diffie-hellman problem. In Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques, EUROCRYPT’03, pages 401–415, Berlin, Heidelberg, 2003. Springer-Verlag.
  • 25. Theory Seminar - Cryptography References Questions? Thank You!