Paper 2016/191
Optimal Security Proofs for Signatures from Identification Schemes
Eike Kiltz, Daniel Masny, and Jiaxin Pan
Abstract
We perform a concrete security treatment of digital signature schemes obtained from canonical identification schemes via the Fiat-Shamir transform. If the identification scheme is rerandomizable and satisfies the weakest possible security notion (key-recoverability), then the implied signature scheme is unforgeability against chosen-message attacks in the multi-user setting in the random oracle model. The reduction loses a factor of roughly Qh, the number of hash queries. Previous security reductions incorporated an additional multiplicative loss of N, the number of users in the system. As an important application of our framework, we obtain a concrete security treatment for Schnorr signatures. Our analysis is done in small steps via intermediate security notions, and all our implications have relatively simple proofs. Furthermore, for each step we show the optimality of the given reduction via a meta-reduction.
Note: This work subsumes and extends ePrint report 2015/1122.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- SignaturesIdentificationSchnorrtightness
- Contact author(s)
- eike kiltz @ rub de
- History
- 2017-11-29: last of 2 revisions
- 2016-02-23: received
- See all versions
- Short URL
- https://ia.cr/2016/191
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/191, author = {Eike Kiltz and Daniel Masny and Jiaxin Pan}, title = {Optimal Security Proofs for Signatures from Identification Schemes}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/191}, year = {2016}, url = {https://eprint.iacr.org/2016/191} }