Cryptography Reference
In-Depth Information
10
Digital Signature
Content
RSA signature: PKCS, ISO/IEC 9796
ElGamal signature family: ElGamal, Schnorr, DSS, ECDSA
Attacks on ElGamal signatures: existential forgery, Bleichenbacher attack
Provable security: interactive proofs, random oracle model
As public-key cryptosystems are the asymmetric alternative to conventional en-
cryption, there is an alternative to MAC algorithms which is the notion of digital
signature. With it, a secret key is given to each person, and a corresponding public key
is released. The person can sign any document, and anybody else can verify the cor-
rectness of the signature. We have already seen in Chapter 5 several signature schemes
based on conventional cryptography: the Lamport scheme and the Merkle scheme based
on hash trees. We study other schemes based on asymmetric cryptography techniques
in this chapter.
10.1
Digital Signature Schemes
Formally, a public-key signature scheme consists of
a pseudorandom key generator which generates a public key K p and a secret key
K s ;
a signature algorithm which from each message X and the secret key K s computes
(in a deterministic or a probabilistic way) a signature
;
a verification algorithm which from each message X , signature
σ
, and public
key K p verifies (in a deterministic way) the correctness of the signature
σ
(see Fig. 10.1).
Digital signatures face several security issues.
1. They must provide authenticity and integrity. For this, it must be impossible for
anyone who does not have access to the secret key to forge a ( X
) pair which
is valid for the public key. This is called a signature forgery .
Of course this assumption must remain valid even when the adversary gets
several valid ( X i i ) pairs, or even when the adversary can choose the X i and
play with the signer as with a black box.
Search WWH ::




Custom Search