On the exact security of Schnorr-type signatures in the Random Oracle Model

70Citations
Citations of this article
67Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The Schnorr signature scheme has been known to be provably secure in the Random Oracle Model under the Discrete Logarithm (DL) assumption since the work of Pointcheval and Stern (EUROCRYPT '96), at the price of a very loose reduction though: if there is a forger making at most q h random oracle queries, and forging signatures with probability ε F , then the Forking Lemma tells that one can compute discrete logarithms with constant probability by rewinding the forger ℓ (qh/∈F)times. In other words, the security reduction loses a factor in its time-to-success ratio. This is rather unsatisfactory since q h may be quite large. Yet Paillier and Vergnaud (ASIACRYPT 2005) later showed that under the One More Discrete Logarithm (OMDL) assumption, any algebraic reduction must lose a factor at least q h1/3 in its time-to-success ratio. This was later improved by Garg et al. (CRYPTO 2008) to a factor q h2/3. Up to now, the gap between and q h remained open. In this paper, we show that the security proof using the Forking Lemma is essentially the best possible. Namely, under the OMDL assumption, any algebraic reduction must lose a factor f(ε F )q h in its time-to-success ratio, where f+1 is a function that remains close to 1 as long as ε F is noticeably smaller than 1. Using a formulation in terms of expected-time and queries algorithms, we obtain an optimal loss factor Ω(q h ), independently of ε F . These results apply to other signature schemes based on one-way group homomorphisms, such as the Guillou-Quisquater signature scheme. © 2012 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Seurin, Y. (2012). On the exact security of Schnorr-type signatures in the Random Oracle Model. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7237 LNCS, pp. 554–571). https://doi.org/10.1007/978-3-642-29011-4_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free