On the Exact Security of Schnorr-Type Signatures in the Random - - PowerPoint PPT Presentation

on the exact security of schnorr type signatures in the
SMART_READER_LITE
LIVE PREVIEW

On the Exact Security of Schnorr-Type Signatures in the Random - - PowerPoint PPT Presentation

On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model Yannick Seurin ANSSI, France 18 April, EUROCRYPT 2012 Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 1 / 28 Introduction Introduction


slide-1
SLIDE 1

On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model

Yannick Seurin

ANSSI, France

18 April, EUROCRYPT 2012

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 1 / 28

slide-2
SLIDE 2

Introduction

Introduction

Schnorr signatures: best-known example of the Fiat-Shamir heuristic proven secure (under the DL assumption) in the Random Oracle Model by Pointcheval and Stern (EC ’96) with the Forking Lemma security reduction loses a factor qh (number of RO queries of the forger), potentially very large previous results showed that losing some factor was “unavoidable”:

a q1/2

h

factor (Paillier and Vergnaud, AC 2005) a q2/3

h

factor (Garg, Bhaskar, and Lokam, CRYPTO 2008)

we show that losing a qh factor is unavoidable, closing the gap between the Forking Lemma and previous impossibility results

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 2 / 28

slide-3
SLIDE 3

Introduction

Introduction

Schnorr signatures: best-known example of the Fiat-Shamir heuristic proven secure (under the DL assumption) in the Random Oracle Model by Pointcheval and Stern (EC ’96) with the Forking Lemma security reduction loses a factor qh (number of RO queries of the forger), potentially very large previous results showed that losing some factor was “unavoidable”:

a q1/2

h

factor (Paillier and Vergnaud, AC 2005) a q2/3

h

factor (Garg, Bhaskar, and Lokam, CRYPTO 2008)

we show that losing a qh factor is unavoidable, closing the gap between the Forking Lemma and previous impossibility results

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 2 / 28

slide-4
SLIDE 4

Introduction

Introduction

Schnorr signatures: best-known example of the Fiat-Shamir heuristic proven secure (under the DL assumption) in the Random Oracle Model by Pointcheval and Stern (EC ’96) with the Forking Lemma security reduction loses a factor qh (number of RO queries of the forger), potentially very large previous results showed that losing some factor was “unavoidable”:

a q1/2

h

factor (Paillier and Vergnaud, AC 2005) a q2/3

h

factor (Garg, Bhaskar, and Lokam, CRYPTO 2008)

we show that losing a qh factor is unavoidable, closing the gap between the Forking Lemma and previous impossibility results

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 2 / 28

slide-5
SLIDE 5

Introduction

Introduction

Schnorr signatures: best-known example of the Fiat-Shamir heuristic proven secure (under the DL assumption) in the Random Oracle Model by Pointcheval and Stern (EC ’96) with the Forking Lemma security reduction loses a factor qh (number of RO queries of the forger), potentially very large previous results showed that losing some factor was “unavoidable”:

a q1/2

h

factor (Paillier and Vergnaud, AC 2005) a q2/3

h

factor (Garg, Bhaskar, and Lokam, CRYPTO 2008)

we show that losing a qh factor is unavoidable, closing the gap between the Forking Lemma and previous impossibility results

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 2 / 28

slide-6
SLIDE 6

Introduction

Introduction

Schnorr signatures: best-known example of the Fiat-Shamir heuristic proven secure (under the DL assumption) in the Random Oracle Model by Pointcheval and Stern (EC ’96) with the Forking Lemma security reduction loses a factor qh (number of RO queries of the forger), potentially very large previous results showed that losing some factor was “unavoidable”:

a q1/2

h

factor (Paillier and Vergnaud, AC 2005) a q2/3

h

factor (Garg, Bhaskar, and Lokam, CRYPTO 2008)

we show that losing a qh factor is unavoidable, closing the gap between the Forking Lemma and previous impossibility results

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 2 / 28

slide-7
SLIDE 7

Introduction

Introduction

Schnorr signatures: best-known example of the Fiat-Shamir heuristic proven secure (under the DL assumption) in the Random Oracle Model by Pointcheval and Stern (EC ’96) with the Forking Lemma security reduction loses a factor qh (number of RO queries of the forger), potentially very large previous results showed that losing some factor was “unavoidable”:

a q1/2

h

factor (Paillier and Vergnaud, AC 2005) a q2/3

h

factor (Garg, Bhaskar, and Lokam, CRYPTO 2008)

we show that losing a qh factor is unavoidable, closing the gap between the Forking Lemma and previous impossibility results

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 2 / 28

slide-8
SLIDE 8

Introduction

Introduction

Schnorr signatures: best-known example of the Fiat-Shamir heuristic proven secure (under the DL assumption) in the Random Oracle Model by Pointcheval and Stern (EC ’96) with the Forking Lemma security reduction loses a factor qh (number of RO queries of the forger), potentially very large previous results showed that losing some factor was “unavoidable”:

a q1/2

h

factor (Paillier and Vergnaud, AC 2005) a q2/3

h

factor (Garg, Bhaskar, and Lokam, CRYPTO 2008)

we show that losing a qh factor is unavoidable, closing the gap between the Forking Lemma and previous impossibility results

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 2 / 28

slide-9
SLIDE 9

Outline

Outline

1

Schnorr Signatures and The Forking Lemma

2

Meta-Reductions

3

Main Result

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 3 / 28

slide-10
SLIDE 10

Schnorr Signatures and The Forking Lemma

Outline

1

Schnorr Signatures and The Forking Lemma

2

Meta-Reductions

3

Main Result

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 4 / 28

slide-11
SLIDE 11

Schnorr Signatures and The Forking Lemma

Schnorr signatures

G cyclic group of prime order q and G a generator of G secret key: x ∈r Zq \ {0} public key: X = Gx Sign(m), m ∈ {0, 1}∗:

a ∈r Zq, A = Ga (commitment)

A=Ga

− − − − − − − − − → c = H(m, A) (challenge)

c

← − − − − − − − − − s = a + cx mod q (answer)

s=a+cx

− − − − − − − − − → signature is (s, c)

Verif(m, (s, c)):

A = GsX −c check H(m, A) = c

Here H is modeled as a random oracle H

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28

slide-12
SLIDE 12

Schnorr Signatures and The Forking Lemma

Schnorr signatures

G cyclic group of prime order q and G a generator of G secret key: x ∈r Zq \ {0} public key: X = Gx Sign(m), m ∈ {0, 1}∗:

a ∈r Zq, A = Ga (commitment)

A=Ga

− − − − − − − − − → c = H(m, A) (challenge)

c

← − − − − − − − − − s = a + cx mod q (answer)

s=a+cx

− − − − − − − − − → signature is (s, c)

Verif(m, (s, c)):

A = GsX −c check H(m, A) = c

Here H is modeled as a random oracle H

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28

slide-13
SLIDE 13

Schnorr Signatures and The Forking Lemma

Schnorr signatures

G cyclic group of prime order q and G a generator of G secret key: x ∈r Zq \ {0} public key: X = Gx Sign(m), m ∈ {0, 1}∗:

a ∈r Zq, A = Ga (commitment)

A=Ga

− − − − − − − − − → c = H(m, A) (challenge)

c

← − − − − − − − − − s = a + cx mod q (answer)

s=a+cx

− − − − − − − − − → signature is (s, c)

Verif(m, (s, c)):

A = GsX −c check H(m, A) = c

Here H is modeled as a random oracle H

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28

slide-14
SLIDE 14

Schnorr Signatures and The Forking Lemma

Schnorr signatures

G cyclic group of prime order q and G a generator of G secret key: x ∈r Zq \ {0} public key: X = Gx Sign(m), m ∈ {0, 1}∗:

a ∈r Zq, A = Ga (commitment)

A=Ga

− − − − − − − − − → c = H(m, A) (challenge)

c

← − − − − − − − − − s = a + cx mod q (answer)

s=a+cx

− − − − − − − − − → signature is (s, c)

Verif(m, (s, c)):

A = GsX −c check H(m, A) = c

Here H is modeled as a random oracle H

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28

slide-15
SLIDE 15

Schnorr Signatures and The Forking Lemma

Schnorr signatures

G cyclic group of prime order q and G a generator of G secret key: x ∈r Zq \ {0} public key: X = Gx Sign(m), m ∈ {0, 1}∗:

a ∈r Zq, A = Ga (commitment)

A=Ga

− − − − − − − − − → c = H(m, A) (challenge)

c

← − − − − − − − − − s = a + cx mod q (answer)

s=a+cx

− − − − − − − − − → signature is (s, c)

Verif(m, (s, c)):

A = GsX −c check H(m, A) = c

Here H is modeled as a random oracle H

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28

slide-16
SLIDE 16

Schnorr Signatures and The Forking Lemma

Schnorr signatures

G cyclic group of prime order q and G a generator of G secret key: x ∈r Zq \ {0} public key: X = Gx Sign(m), m ∈ {0, 1}∗:

a ∈r Zq, A = Ga (commitment)

A=Ga

− − − − − − − − − → c = H(m, A) (challenge)

c

← − − − − − − − − − s = a + cx mod q (answer)

s=a+cx

− − − − − − − − − → signature is (s, c)

Verif(m, (s, c)):

A = GsX −c check H(m, A) = c

Here H is modeled as a random oracle H

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28

slide-17
SLIDE 17

Schnorr Signatures and The Forking Lemma

Schnorr signatures

G cyclic group of prime order q and G a generator of G secret key: x ∈r Zq \ {0} public key: X = Gx Sign(m), m ∈ {0, 1}∗:

a ∈r Zq, A = Ga (commitment)

A=Ga

− − − − − − − − − → c = H(m, A) (challenge)

c

← − − − − − − − − − s = a + cx mod q (answer)

s=a+cx

− − − − − − − − − → signature is (s, c)

Verif(m, (s, c)):

A = GsX −c check H(m, A) = c

Here H is modeled as a random oracle H

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28

slide-18
SLIDE 18

Schnorr Signatures and The Forking Lemma

Schnorr signatures

G cyclic group of prime order q and G a generator of G secret key: x ∈r Zq \ {0} public key: X = Gx Sign(m), m ∈ {0, 1}∗:

a ∈r Zq, A = Ga (commitment)

A=Ga

− − − − − − − − − → c = H(m, A) (challenge)

c

← − − − − − − − − − s = a + cx mod q (answer)

s=a+cx

− − − − − − − − − → signature is (s, c)

Verif(m, (s, c)):

A = GsX −c check H(m, A) = c

Here H is modeled as a random oracle H

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28

slide-19
SLIDE 19

Schnorr Signatures and The Forking Lemma

Schnorr signatures

G cyclic group of prime order q and G a generator of G secret key: x ∈r Zq \ {0} public key: X = Gx Sign(m), m ∈ {0, 1}∗:

a ∈r Zq, A = Ga (commitment)

A=Ga

− − − − − − − − − → c = H(m, A) (challenge)

c

← − − − − − − − − − s = a + cx mod q (answer)

s=a+cx

− − − − − − − − − → signature is (s, c)

Verif(m, (s, c)):

A = GsX −c check H(m, A) = c

Here H is modeled as a random oracle H

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28

slide-20
SLIDE 20

Schnorr Signatures and The Forking Lemma

Schnorr signatures

G cyclic group of prime order q and G a generator of G secret key: x ∈r Zq \ {0} public key: X = Gx Sign(m), m ∈ {0, 1}∗:

a ∈r Zq, A = Ga (commitment)

A=Ga

− − − − − − − − − → c = H(m, A) (challenge)

c

← − − − − − − − − − s = a + cx mod q (answer)

s=a+cx

− − − − − − − − − → signature is (s, c)

Verif(m, (s, c)):

A = GsX −c check H(m, A) = c

Here H is modeled as a random oracle H

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28

slide-21
SLIDE 21

Schnorr Signatures and The Forking Lemma

Schnorr signatures

G cyclic group of prime order q and G a generator of G secret key: x ∈r Zq \ {0} public key: X = Gx Sign(m), m ∈ {0, 1}∗:

a ∈r Zq, A = Ga (commitment)

A=Ga

− − − − − − − − − → c = H(m, A) (challenge)

c

← − − − − − − − − − s = a + cx mod q (answer)

s=a+cx

− − − − − − − − − → signature is (s, c)

Verif(m, (s, c)):

A = GsX −c check H(m, A) = c

Here H is modeled as a random oracle H

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28

slide-22
SLIDE 22

Schnorr Signatures and The Forking Lemma

Schnorr signatures

G cyclic group of prime order q and G a generator of G secret key: x ∈r Zq \ {0} public key: X = Gx Sign(m), m ∈ {0, 1}∗:

a ∈r Zq, A = Ga (commitment)

A=Ga

− − − − − − − − − → c = H(m, A) (challenge)

c

← − − − − − − − − − s = a + cx mod q (answer)

s=a+cx

− − − − − − − − − → signature is (s, c)

Verif(m, (s, c)):

A = GsX −c check H(m, A) = c

Here H is modeled as a random oracle H

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28

slide-23
SLIDE 23

Schnorr Signatures and The Forking Lemma

Forger adversary against Schnorr signatures

we focus on universal forgery under no-message attacks: the adversary is given a message m and a public key X and must return a forgery (s, c) for m (it cannot make signature queries) the random tape of the forger will be explicitly denoted ω parameters characterizing a forger F:

running time tF success probability εF → time-to-success ratio ρF = tF/εF maximal number of RO queries qh

F H (m, X, ω) (s, c) ≤ qh

pictorial representation of a forgery experiment:

(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh forgery (sℓ, cℓ) with sℓ = DLog(AℓX cℓ)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 6 / 28

slide-24
SLIDE 24

Schnorr Signatures and The Forking Lemma

Forger adversary against Schnorr signatures

we focus on universal forgery under no-message attacks: the adversary is given a message m and a public key X and must return a forgery (s, c) for m (it cannot make signature queries) the random tape of the forger will be explicitly denoted ω parameters characterizing a forger F:

running time tF success probability εF → time-to-success ratio ρF = tF/εF maximal number of RO queries qh

F H (m, X, ω) (s, c) ≤ qh

pictorial representation of a forgery experiment:

(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh forgery (sℓ, cℓ) with sℓ = DLog(AℓX cℓ)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 6 / 28

slide-25
SLIDE 25

Schnorr Signatures and The Forking Lemma

Forger adversary against Schnorr signatures

we focus on universal forgery under no-message attacks: the adversary is given a message m and a public key X and must return a forgery (s, c) for m (it cannot make signature queries) the random tape of the forger will be explicitly denoted ω parameters characterizing a forger F:

running time tF success probability εF → time-to-success ratio ρF = tF/εF maximal number of RO queries qh

F H (m, X, ω) (s, c) ≤ qh

pictorial representation of a forgery experiment:

(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh forgery (sℓ, cℓ) with sℓ = DLog(AℓX cℓ)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 6 / 28

slide-26
SLIDE 26

Schnorr Signatures and The Forking Lemma

Forger adversary against Schnorr signatures

we focus on universal forgery under no-message attacks: the adversary is given a message m and a public key X and must return a forgery (s, c) for m (it cannot make signature queries) the random tape of the forger will be explicitly denoted ω parameters characterizing a forger F:

running time tF success probability εF → time-to-success ratio ρF = tF/εF maximal number of RO queries qh

F H (m, X, ω) (s, c) ≤ qh

pictorial representation of a forgery experiment:

(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh forgery (sℓ, cℓ) with sℓ = DLog(AℓX cℓ)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 6 / 28

slide-27
SLIDE 27

Schnorr Signatures and The Forking Lemma

Forger adversary against Schnorr signatures

we focus on universal forgery under no-message attacks: the adversary is given a message m and a public key X and must return a forgery (s, c) for m (it cannot make signature queries) the random tape of the forger will be explicitly denoted ω parameters characterizing a forger F:

running time tF success probability εF → time-to-success ratio ρF = tF/εF maximal number of RO queries qh

F H (m, X, ω) (s, c) ≤ qh

pictorial representation of a forgery experiment:

(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh forgery (sℓ, cℓ) with sℓ = DLog(AℓX cℓ)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 6 / 28

slide-28
SLIDE 28

Schnorr Signatures and The Forking Lemma

Extracting discrete logarithms from a forger

given a forger F, one can build a reduction R which solves the DL problem for the public key X = Gx using F as a black-box main idea: have the forger output two forgeries (s1, c1) and (s2, c2) for the same message m and the same commitment A = Ga, so that: s1 = a + c1x and s2 = a + c2x ⇒ x = s1 − s2 c1 − c2 mod q

F H (m, X, ω) (s, c) X x = DLog(X) R

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 7 / 28

slide-29
SLIDE 29

Schnorr Signatures and The Forking Lemma

Extracting discrete logarithms from a forger

given a forger F, one can build a reduction R which solves the DL problem for the public key X = Gx using F as a black-box main idea: have the forger output two forgeries (s1, c1) and (s2, c2) for the same message m and the same commitment A = Ga, so that: s1 = a + c1x and s2 = a + c2x ⇒ x = s1 − s2 c1 − c2 mod q

F R.H (m, X, ω) (s, c) X x = DLog(X) R

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 7 / 28

slide-30
SLIDE 30

Schnorr Signatures and The Forking Lemma

Extracting discrete logarithms from a forger

given a forger F, one can build a reduction R which solves the DL problem for the public key X = Gx using F as a black-box main idea: have the forger output two forgeries (s1, c1) and (s2, c2) for the same message m and the same commitment A = Ga, so that: s1 = a + c1x and s2 = a + c2x ⇒ x = s1 − s2 c1 − c2 mod q

F R.H (m, X, ω) (s, c) X x = DLog(X) R

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 7 / 28

slide-31
SLIDE 31

Schnorr Signatures and The Forking Lemma

Multiple invocations of the forger: forking

how does R obtain two forgeries for the same commitment A? ⇒ “replay attack” run F until it returns a first forgery for some RO query index ℓ ∈ [1..qh] replay the attack up to the forgery point, using new random RO answers from this point keep doing this until F returns a new forgery for the same RO query

(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 8 / 28

slide-32
SLIDE 32

Schnorr Signatures and The Forking Lemma

Multiple invocations of the forger: forking

how does R obtain two forgeries for the same commitment A? ⇒ “replay attack” run F until it returns a first forgery for some RO query index ℓ ∈ [1..qh] replay the attack up to the forgery point, using new random RO answers from this point keep doing this until F returns a new forgery for the same RO query

(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 8 / 28

slide-33
SLIDE 33

Schnorr Signatures and The Forking Lemma

Multiple invocations of the forger: forking

how does R obtain two forgeries for the same commitment A? ⇒ “replay attack” run F until it returns a first forgery for some RO query index ℓ ∈ [1..qh] replay the attack up to the forgery point, using new random RO answers from this point keep doing this until F returns a new forgery for the same RO query

(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 8 / 28

slide-34
SLIDE 34

Schnorr Signatures and The Forking Lemma

Multiple invocations of the forger: forking

how does R obtain two forgeries for the same commitment A? ⇒ “replay attack” run F until it returns a first forgery for some RO query index ℓ ∈ [1..qh] replay the attack up to the forgery point, using new random RO answers from this point keep doing this until F returns a new forgery for the same RO query

(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 8 / 28

slide-35
SLIDE 35

Schnorr Signatures and The Forking Lemma

Multiple invocations of the forger: forking

how does R obtain two forgeries for the same commitment A? ⇒ “replay attack” run F until it returns a first forgery for some RO query index ℓ ∈ [1..qh] replay the attack up to the forgery point, using new random RO answers from this point keep doing this until F returns a new forgery for the same RO query

(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 8 / 28

slide-36
SLIDE 36

Schnorr Signatures and The Forking Lemma

Multiple invocations of the forger: forking

how does R obtain two forgeries for the same commitment A? ⇒ “replay attack” run F until it returns a first forgery for some RO query index ℓ ∈ [1..qh] replay the attack up to the forgery point, using new random RO answers from this point keep doing this until F returns a new forgery for the same RO query

(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 8 / 28

slide-37
SLIDE 37

Schnorr Signatures and The Forking Lemma

Success probability of the reduction: the Forking Lemma

to obtain the first forgery with constant proba.: ⇒ run the forger ≃ 1/εF times to obtain the second forgery with constant proba.: ⇒ run the forger ≃ qh/εF times total running time tR ≃ qh/εF × tF for constant success proba. ⇒ time-to-success ratio of the reduction: ρR ≃ qhρF ⇒ loses a factor qh no matching attack known! (best known attack = computing discrete log) Question Is there a better reduction with a time-to-success ratio closer to the one of the forger?

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 9 / 28

slide-38
SLIDE 38

Schnorr Signatures and The Forking Lemma

Success probability of the reduction: the Forking Lemma

to obtain the first forgery with constant proba.: ⇒ run the forger ≃ 1/εF times to obtain the second forgery with constant proba.: ⇒ run the forger ≃ qh/εF times total running time tR ≃ qh/εF × tF for constant success proba. ⇒ time-to-success ratio of the reduction: ρR ≃ qhρF ⇒ loses a factor qh no matching attack known! (best known attack = computing discrete log) Question Is there a better reduction with a time-to-success ratio closer to the one of the forger?

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 9 / 28

slide-39
SLIDE 39

Schnorr Signatures and The Forking Lemma

Success probability of the reduction: the Forking Lemma

to obtain the first forgery with constant proba.: ⇒ run the forger ≃ 1/εF times to obtain the second forgery with constant proba.: ⇒ run the forger ≃ qh/εF times total running time tR ≃ qh/εF × tF for constant success proba. ⇒ time-to-success ratio of the reduction: ρR ≃ qhρF ⇒ loses a factor qh no matching attack known! (best known attack = computing discrete log) Question Is there a better reduction with a time-to-success ratio closer to the one of the forger?

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 9 / 28

slide-40
SLIDE 40

Schnorr Signatures and The Forking Lemma

Success probability of the reduction: the Forking Lemma

to obtain the first forgery with constant proba.: ⇒ run the forger ≃ 1/εF times to obtain the second forgery with constant proba.: ⇒ run the forger ≃ qh/εF times total running time tR ≃ qh/εF × tF for constant success proba. ⇒ time-to-success ratio of the reduction: ρR ≃ qhρF ⇒ loses a factor qh no matching attack known! (best known attack = computing discrete log) Question Is there a better reduction with a time-to-success ratio closer to the one of the forger?

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 9 / 28

slide-41
SLIDE 41

Schnorr Signatures and The Forking Lemma

Success probability of the reduction: the Forking Lemma

to obtain the first forgery with constant proba.: ⇒ run the forger ≃ 1/εF times to obtain the second forgery with constant proba.: ⇒ run the forger ≃ qh/εF times total running time tR ≃ qh/εF × tF for constant success proba. ⇒ time-to-success ratio of the reduction: ρR ≃ qhρF ⇒ loses a factor qh no matching attack known! (best known attack = computing discrete log) Question Is there a better reduction with a time-to-success ratio closer to the one of the forger?

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 9 / 28

slide-42
SLIDE 42

Meta-Reductions

Outline

1

Schnorr Signatures and The Forking Lemma

2

Meta-Reductions

3

Main Result

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 10 / 28

slide-43
SLIDE 43

Meta-Reductions

The concept of meta-reduction

Boneh and Venkatesan (EC ’98) example: If there is an (algebraic) reduction R from factoring to solving the RSA problem with small public exponents, then there is a meta-reduction M factoring RSA moduli directly (using R) ⇒ algebraic reductions from factoring to breaking low-RSA exponents cannot exist unless factoring is easy here, we will show that an (algebraic) reduction from the Discrete Log (DL) problem to forging Schnorr signatures cannot be tight, unless the One More Discrete Logarithm (OMDL) problem is easy

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 11 / 28

slide-44
SLIDE 44

Meta-Reductions

The concept of meta-reduction

Boneh and Venkatesan (EC ’98) example: If there is an (algebraic) reduction R from factoring to solving the RSA problem with small public exponents, then there is a meta-reduction M factoring RSA moduli directly (using R) ⇒ algebraic reductions from factoring to breaking low-RSA exponents cannot exist unless factoring is easy here, we will show that an (algebraic) reduction from the Discrete Log (DL) problem to forging Schnorr signatures cannot be tight, unless the One More Discrete Logarithm (OMDL) problem is easy

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 11 / 28

slide-45
SLIDE 45

Meta-Reductions

The One More Discrete Logarithm (OMDL) problem

Definition M solves the OMDL problem if given (A0, A1, . . . , An) ∈r Gn+1, it returns the discrete log of all Ai’s by making at most n calls to a discrete log

  • racle DLog(·).

M DLog(·) A0, . . . , An DLog(A0), . . . , DLog(An) ≤ n

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 12 / 28

slide-46
SLIDE 46

Meta-Reductions

Restriction to algebraic reductions

Definition An algorithm R is algebraic (w.r.t. G) if it only applies group operations

  • n group elements (no bit manipulation, e.g. G ⊕ G′).

Consequence There exists a procedure Extract which, given the group elements (G1, . . . , Gk) input to R, R’s code and random tape, and any group element Y output by R, extracts (α1, . . . , αk) such that: Y = Gα1

1 · · · Gαk k

NB: all known reductions for DL-based cryptosystems are algebraic (in particular the reduction of [PS96] for Schnorr signatures)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 13 / 28

slide-47
SLIDE 47

Meta-Reductions

Restriction to algebraic reductions

Definition An algorithm R is algebraic (w.r.t. G) if it only applies group operations

  • n group elements (no bit manipulation, e.g. G ⊕ G′).

Consequence There exists a procedure Extract which, given the group elements (G1, . . . , Gk) input to R, R’s code and random tape, and any group element Y output by R, extracts (α1, . . . , αk) such that: Y = Gα1

1 · · · Gαk k

NB: all known reductions for DL-based cryptosystems are algebraic (in particular the reduction of [PS96] for Schnorr signatures)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 13 / 28

slide-48
SLIDE 48

Meta-Reductions

Restriction to algebraic reductions

Definition An algorithm R is algebraic (w.r.t. G) if it only applies group operations

  • n group elements (no bit manipulation, e.g. G ⊕ G′).

Consequence There exists a procedure Extract which, given the group elements (G1, . . . , Gk) input to R, R’s code and random tape, and any group element Y output by R, extracts (α1, . . . , αk) such that: Y = Gα1

1 · · · Gαk k

NB: all known reductions for DL-based cryptosystems are algebraic (in particular the reduction of [PS96] for Schnorr signatures)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 13 / 28

slide-49
SLIDE 49

Meta-Reductions

Meta-reduction: main idea

F R.H (m, X, ω) (s, c) ≤ qh A0 DLog(A0) ≤ n R DLog(·) A0, . . . , An DLog(A0), . . . , DLog(An) ≤ n M

n=number of times the reduction runs the forger

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 14 / 28

slide-50
SLIDE 50

Meta-Reductions

Meta-reduction: main idea

M.F R.H (m, X, ω) (s, c) ≤ qh A0 DLog(A0) ≤ n R DLog(·) A0, . . . , An DLog(A0), . . . , DLog(An) ≤ n M

n=number of times the reduction runs the forger

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 14 / 28

slide-51
SLIDE 51

Meta-Reductions

Meta-reduction: the general strategy

M receives (A0, A1, . . . , An) as input and uses A0 as input to R M uses Ai, i = 1, . . . , n during the i-th simulation of the forger to construct qh commitments Aβ1

i , . . . , A βqh i

for each simulation, M chooses some forgery index ℓi (more on the choice later) and uses its discrete log oracle to forge a signature (si, ci) by querying si = DLog(A

βℓi i

X

cℓi i

) if the reduction succeeds in returning a0 = DLog(A0), and unless some bad event happens, M will be able to use a0 and (si, ci) to compute ai = DLog(Ai) for i = 1, . . . , n

(mi, Xi, ωi) Aβ1

i

c1 Aβ2

i

c2 Aβ3

i

A

βℓi i

cℓi A

βqh i

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 15 / 28

slide-52
SLIDE 52

Meta-Reductions

Meta-reduction: the general strategy

M receives (A0, A1, . . . , An) as input and uses A0 as input to R M uses Ai, i = 1, . . . , n during the i-th simulation of the forger to construct qh commitments Aβ1

i , . . . , A βqh i

for each simulation, M chooses some forgery index ℓi (more on the choice later) and uses its discrete log oracle to forge a signature (si, ci) by querying si = DLog(A

βℓi i

X

cℓi i

) if the reduction succeeds in returning a0 = DLog(A0), and unless some bad event happens, M will be able to use a0 and (si, ci) to compute ai = DLog(Ai) for i = 1, . . . , n

(mi, Xi, ωi) Aβ1

i

c1 Aβ2

i

c2 Aβ3

i

A

βℓi i

cℓi A

βqh i

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 15 / 28

slide-53
SLIDE 53

Meta-Reductions

Meta-reduction: the general strategy

M receives (A0, A1, . . . , An) as input and uses A0 as input to R M uses Ai, i = 1, . . . , n during the i-th simulation of the forger to construct qh commitments Aβ1

i , . . . , A βqh i

for each simulation, M chooses some forgery index ℓi (more on the choice later) and uses its discrete log oracle to forge a signature (si, ci) by querying si = DLog(A

βℓi i

X

cℓi i

) if the reduction succeeds in returning a0 = DLog(A0), and unless some bad event happens, M will be able to use a0 and (si, ci) to compute ai = DLog(Ai) for i = 1, . . . , n

(mi, Xi, ωi) Aβ1

i

c1 Aβ2

i

c2 Aβ3

i

A

βℓi i

cℓi A

βqh i

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 15 / 28

slide-54
SLIDE 54

Meta-Reductions

Meta-reduction: the general strategy

M receives (A0, A1, . . . , An) as input and uses A0 as input to R M uses Ai, i = 1, . . . , n during the i-th simulation of the forger to construct qh commitments Aβ1

i , . . . , A βqh i

for each simulation, M chooses some forgery index ℓi (more on the choice later) and uses its discrete log oracle to forge a signature (si, ci) by querying si = DLog(A

βℓi i

X

cℓi i

) if the reduction succeeds in returning a0 = DLog(A0), and unless some bad event happens, M will be able to use a0 and (si, ci) to compute ai = DLog(Ai) for i = 1, . . . , n

(mi, Xi, ωi) Aβ1

i

c1 Aβ2

i

c2 Aβ3

i

A

βℓi i

cℓi A

βqh i

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 15 / 28

slide-55
SLIDE 55

Meta-Reductions

Extraction of DLog(Ai) by the meta-reduction

if the simulation of the forger by M is OK, R returns a0 = DLog(A0) (with probability ≃ εR) M must then use a0 and the forged signatures (si, ci) to compute DLog(Ai) for i = 1, . . . , n the i-th forgery was computed with si = DLog(Aβ

i X ci i )

→ computing DLog(Ai) ⇔ computing DLog(Xi) how can M retrieve the discrete log of the public keys Xi received from the reduction R? ⇒ restriction to algebraic reductions group elements input to R: G, A0 procedure Extract yields γi, γ′

i such that

Xi = GγiA

γ′

i

0 = Gγi+a0γ′

i Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 16 / 28

slide-56
SLIDE 56

Meta-Reductions

Extraction of DLog(Ai) by the meta-reduction

if the simulation of the forger by M is OK, R returns a0 = DLog(A0) (with probability ≃ εR) M must then use a0 and the forged signatures (si, ci) to compute DLog(Ai) for i = 1, . . . , n the i-th forgery was computed with si = DLog(Aβ

i X ci i )

→ computing DLog(Ai) ⇔ computing DLog(Xi) how can M retrieve the discrete log of the public keys Xi received from the reduction R? ⇒ restriction to algebraic reductions group elements input to R: G, A0 procedure Extract yields γi, γ′

i such that

Xi = GγiA

γ′

i

0 = Gγi+a0γ′

i Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 16 / 28

slide-57
SLIDE 57

Meta-Reductions

Extraction of DLog(Ai) by the meta-reduction

if the simulation of the forger by M is OK, R returns a0 = DLog(A0) (with probability ≃ εR) M must then use a0 and the forged signatures (si, ci) to compute DLog(Ai) for i = 1, . . . , n the i-th forgery was computed with si = DLog(Aβ

i X ci i )

→ computing DLog(Ai) ⇔ computing DLog(Xi) how can M retrieve the discrete log of the public keys Xi received from the reduction R? ⇒ restriction to algebraic reductions group elements input to R: G, A0 procedure Extract yields γi, γ′

i such that

Xi = GγiA

γ′

i

0 = Gγi+a0γ′

i Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 16 / 28

slide-58
SLIDE 58

Meta-Reductions

Extraction of DLog(Ai) by the meta-reduction

if the simulation of the forger by M is OK, R returns a0 = DLog(A0) (with probability ≃ εR) M must then use a0 and the forged signatures (si, ci) to compute DLog(Ai) for i = 1, . . . , n the i-th forgery was computed with si = DLog(Aβ

i X ci i )

→ computing DLog(Ai) ⇔ computing DLog(Xi) how can M retrieve the discrete log of the public keys Xi received from the reduction R? ⇒ restriction to algebraic reductions group elements input to R: G, A0 procedure Extract yields γi, γ′

i such that

Xi = GγiA

γ′

i

0 = Gγi+a0γ′

i Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 16 / 28

slide-59
SLIDE 59

Meta-Reductions

Extraction of DLog(Ai) by the meta-reduction

if the simulation of the forger by M is OK, R returns a0 = DLog(A0) (with probability ≃ εR) M must then use a0 and the forged signatures (si, ci) to compute DLog(Ai) for i = 1, . . . , n the i-th forgery was computed with si = DLog(Aβ

i X ci i )

→ computing DLog(Ai) ⇔ computing DLog(Xi) how can M retrieve the discrete log of the public keys Xi received from the reduction R? ⇒ restriction to algebraic reductions group elements input to R: G, A0 procedure Extract yields γi, γ′

i such that

Xi = GγiA

γ′

i

0 = Gγi+a0γ′

i Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 16 / 28

slide-60
SLIDE 60

Meta-Reductions

Extraction of DLog(Ai) by the meta-reduction

if the simulation of the forger by M is OK, R returns a0 = DLog(A0) (with probability ≃ εR) M must then use a0 and the forged signatures (si, ci) to compute DLog(Ai) for i = 1, . . . , n the i-th forgery was computed with si = DLog(Aβ

i X ci i )

→ computing DLog(Ai) ⇔ computing DLog(Xi) how can M retrieve the discrete log of the public keys Xi received from the reduction R? ⇒ restriction to algebraic reductions group elements input to R: G, A0 procedure Extract yields γi, γ′

i such that

Xi = GγiA

γ′

i

0 = Gγi+a0γ′

i Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 16 / 28

slide-61
SLIDE 61

Meta-Reductions

A bad event which makes the meta-reduction fail

two simulations may share some common history (under control of R!) as in the Forking Lemma M fails if it forges two signatures for the same commitment because it will make a useless call to DLog(·) → event Bad happens NB: this is exactly the event which makes the reduction succeed in the Forking Lemma unless Pr[Bad] ≃ 1, we get a contradiction since otherwise M is an efficient and successful algorithm for the OMDL problem

(mi, Xi, ωi) Aβ1

i

c1 Aβ2

i

c2 Aβ3

i

A

βℓi i

cℓi A

βqh i

A

βℓi +1 i+1

A

βℓi +2 i+1

A

βqh i+1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 17 / 28

slide-62
SLIDE 62

Meta-Reductions

A bad event which makes the meta-reduction fail

two simulations may share some common history (under control of R!) as in the Forking Lemma M fails if it forges two signatures for the same commitment because it will make a useless call to DLog(·) → event Bad happens NB: this is exactly the event which makes the reduction succeed in the Forking Lemma unless Pr[Bad] ≃ 1, we get a contradiction since otherwise M is an efficient and successful algorithm for the OMDL problem

(mi, Xi, ωi) Aβ1

i

c1 Aβ2

i

c2 Aβ3

i

A

βℓi i

cℓi A

βqh i

A

βℓi +1 i+1

A

βℓi +2 i+1

A

βqh i+1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 17 / 28

slide-63
SLIDE 63

Meta-Reductions

A bad event which makes the meta-reduction fail

two simulations may share some common history (under control of R!) as in the Forking Lemma M fails if it forges two signatures for the same commitment because it will make a useless call to DLog(·) → event Bad happens NB: this is exactly the event which makes the reduction succeed in the Forking Lemma unless Pr[Bad] ≃ 1, we get a contradiction since otherwise M is an efficient and successful algorithm for the OMDL problem

(mi, Xi, ωi) Aβ1

i

c1 Aβ2

i

c2 Aβ3

i

A

βℓi i

cℓi A

βqh i

A

βℓi +1 i+1

A

βℓi +2 i+1

A

βqh i+1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 17 / 28

slide-64
SLIDE 64

Meta-Reductions

A bad event which makes the meta-reduction fail

two simulations may share some common history (under control of R!) as in the Forking Lemma M fails if it forges two signatures for the same commitment because it will make a useless call to DLog(·) → event Bad happens NB: this is exactly the event which makes the reduction succeed in the Forking Lemma unless Pr[Bad] ≃ 1, we get a contradiction since otherwise M is an efficient and successful algorithm for the OMDL problem

(mi, Xi, ωi) Aβ1

i

c1 Aβ2

i

c2 Aβ3

i

A

βℓi i

cℓi A

βqh i

A

βℓi +1 i+1

A

βℓi +2 i+1

A

βqh i+1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 17 / 28

slide-65
SLIDE 65

Meta-Reductions

A bad event which makes the meta-reduction fail

two simulations may share some common history (under control of R!) as in the Forking Lemma M fails if it forges two signatures for the same commitment because it will make a useless call to DLog(·) → event Bad happens NB: this is exactly the event which makes the reduction succeed in the Forking Lemma unless Pr[Bad] ≃ 1, we get a contradiction since otherwise M is an efficient and successful algorithm for the OMDL problem

(mi, Xi, ωi) Aβ1

i

c1 Aβ2

i

c2 Aβ3

i

A

βℓi i

cℓi A

βqh i

A

βℓi +1 i+1

A

βℓi +2 i+1

A

βqh i+1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 17 / 28

slide-66
SLIDE 66

Meta-Reductions

A bad event which makes the meta-reduction fail

two simulations may share some common history (under control of R!) as in the Forking Lemma M fails if it forges two signatures for the same commitment because it will make a useless call to DLog(·) → event Bad happens NB: this is exactly the event which makes the reduction succeed in the Forking Lemma unless Pr[Bad] ≃ 1, we get a contradiction since otherwise M is an efficient and successful algorithm for the OMDL problem

(mi, Xi, ωi) Aβ1

i

c1 Aβ2

i

c2 Aβ3

i

A

βℓi i

cℓi A

βqh i

A

βℓi +1 i+1

A

βℓi +2 i+1

A

βqh i+1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 17 / 28

slide-67
SLIDE 67

Meta-Reductions

Simulation of the forger: choice of the forgery index

how should the meta-reduction choose the forgery index ℓi for the i-th execution? cannot choose ℓ1 = 1, ℓ2 = 2, etc. (the reduction would “notice” that a simulation is ongoing) natural choice: draw ℓi uniformly at random in [1..qh] independently for each execution i = 1, . . . , n this is what was done in previous work [PV05,GBL08] straightforward analysis [PV05]: Pr[Bad] ≃ n2 qh ⇒ n ≃ q1/2

h

for Pr[Bad] ≃ 1 more careful analysis [GBL08]: Pr[Bad] ≃ n3/2 qh ⇒ n ≃ q2/3

h

for Pr[Bad] ≃ 1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 18 / 28

slide-68
SLIDE 68

Meta-Reductions

Simulation of the forger: choice of the forgery index

how should the meta-reduction choose the forgery index ℓi for the i-th execution? cannot choose ℓ1 = 1, ℓ2 = 2, etc. (the reduction would “notice” that a simulation is ongoing) natural choice: draw ℓi uniformly at random in [1..qh] independently for each execution i = 1, . . . , n this is what was done in previous work [PV05,GBL08] straightforward analysis [PV05]: Pr[Bad] ≃ n2 qh ⇒ n ≃ q1/2

h

for Pr[Bad] ≃ 1 more careful analysis [GBL08]: Pr[Bad] ≃ n3/2 qh ⇒ n ≃ q2/3

h

for Pr[Bad] ≃ 1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 18 / 28

slide-69
SLIDE 69

Meta-Reductions

Simulation of the forger: choice of the forgery index

how should the meta-reduction choose the forgery index ℓi for the i-th execution? cannot choose ℓ1 = 1, ℓ2 = 2, etc. (the reduction would “notice” that a simulation is ongoing) natural choice: draw ℓi uniformly at random in [1..qh] independently for each execution i = 1, . . . , n this is what was done in previous work [PV05,GBL08] straightforward analysis [PV05]: Pr[Bad] ≃ n2 qh ⇒ n ≃ q1/2

h

for Pr[Bad] ≃ 1 more careful analysis [GBL08]: Pr[Bad] ≃ n3/2 qh ⇒ n ≃ q2/3

h

for Pr[Bad] ≃ 1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 18 / 28

slide-70
SLIDE 70

Meta-Reductions

Simulation of the forger: choice of the forgery index

how should the meta-reduction choose the forgery index ℓi for the i-th execution? cannot choose ℓ1 = 1, ℓ2 = 2, etc. (the reduction would “notice” that a simulation is ongoing) natural choice: draw ℓi uniformly at random in [1..qh] independently for each execution i = 1, . . . , n this is what was done in previous work [PV05,GBL08] straightforward analysis [PV05]: Pr[Bad] ≃ n2 qh ⇒ n ≃ q1/2

h

for Pr[Bad] ≃ 1 more careful analysis [GBL08]: Pr[Bad] ≃ n3/2 qh ⇒ n ≃ q2/3

h

for Pr[Bad] ≃ 1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 18 / 28

slide-71
SLIDE 71

Meta-Reductions

Simulation of the forger: choice of the forgery index

how should the meta-reduction choose the forgery index ℓi for the i-th execution? cannot choose ℓ1 = 1, ℓ2 = 2, etc. (the reduction would “notice” that a simulation is ongoing) natural choice: draw ℓi uniformly at random in [1..qh] independently for each execution i = 1, . . . , n this is what was done in previous work [PV05,GBL08] straightforward analysis [PV05]: Pr[Bad] ≃ n2 qh ⇒ n ≃ q1/2

h

for Pr[Bad] ≃ 1 more careful analysis [GBL08]: Pr[Bad] ≃ n3/2 qh ⇒ n ≃ q2/3

h

for Pr[Bad] ≃ 1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 18 / 28

slide-72
SLIDE 72

Meta-Reductions

Simulation of the forger: choice of the forgery index

how should the meta-reduction choose the forgery index ℓi for the i-th execution? cannot choose ℓ1 = 1, ℓ2 = 2, etc. (the reduction would “notice” that a simulation is ongoing) natural choice: draw ℓi uniformly at random in [1..qh] independently for each execution i = 1, . . . , n this is what was done in previous work [PV05,GBL08] straightforward analysis [PV05]: Pr[Bad] ≃ n2 qh ⇒ n ≃ q1/2

h

for Pr[Bad] ≃ 1 more careful analysis [GBL08]: Pr[Bad] ≃ n3/2 qh ⇒ n ≃ q2/3

h

for Pr[Bad] ≃ 1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 18 / 28

slide-73
SLIDE 73

Main Result

Outline

1

Schnorr Signatures and The Forking Lemma

2

Meta-Reductions

3

Main Result

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 19 / 28

slide-74
SLIDE 74

Main Result

Main theorem

Theorem Any algebraic reduction from the DL problem to forging Schnorr signatures must lose a factor qh in its time-to-success ratio, assuming the OMDL problem is hard. for strictly bounded adversaries, factor f (εF)qh with f (εF) close to 1 as long as εF < 0.9 for expected-time and queries adversaries, factor qh independently of εF proof: new meta-reduction (crucial modification = choice of the forgery index ℓ for the simulated forger)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 20 / 28

slide-75
SLIDE 75

Main Result

Main theorem

Theorem Any algebraic reduction from the DL problem to forging Schnorr signatures must lose a factor qh in its time-to-success ratio, assuming the OMDL problem is hard. for strictly bounded adversaries, factor f (εF)qh with f (εF) close to 1 as long as εF < 0.9 for expected-time and queries adversaries, factor qh independently of εF proof: new meta-reduction (crucial modification = choice of the forgery index ℓ for the simulated forger)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 20 / 28

slide-76
SLIDE 76

Main Result

Main theorem

Theorem Any algebraic reduction from the DL problem to forging Schnorr signatures must lose a factor qh in its time-to-success ratio, assuming the OMDL problem is hard. for strictly bounded adversaries, factor f (εF)qh with f (εF) close to 1 as long as εF < 0.9 for expected-time and queries adversaries, factor qh independently of εF proof: new meta-reduction (crucial modification = choice of the forgery index ℓ for the simulated forger)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 20 / 28

slide-77
SLIDE 77

Main Result

Main theorem

Theorem Any algebraic reduction from the DL problem to forging Schnorr signatures must lose a factor qh in its time-to-success ratio, assuming the OMDL problem is hard. for strictly bounded adversaries, factor f (εF)qh with f (εF) close to 1 as long as εF < 0.9 for expected-time and queries adversaries, factor qh independently of εF proof: new meta-reduction (crucial modification = choice of the forgery index ℓ for the simulated forger)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 20 / 28

slide-78
SLIDE 78

Main Result

A thought experiment

consider the following hypothetic forger F: G is partitioned into two sets:

Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set

to forge a signature for m, F makes arbitrary RO queries H(m, Ai) = ci and returns a forgery for the first query such that AiX ci ∈ Γgood (or fails to forge if there is no such query) success probability of F if it makes qh RO queries:

for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh

we will call such a F a µ-good forger

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28

slide-79
SLIDE 79

Main Result

A thought experiment

consider the following hypothetic forger F: G is partitioned into two sets:

Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set

to forge a signature for m, F makes arbitrary RO queries H(m, Ai) = ci and returns a forgery for the first query such that AiX ci ∈ Γgood (or fails to forge if there is no such query) success probability of F if it makes qh RO queries:

for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh

we will call such a F a µ-good forger

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28

slide-80
SLIDE 80

Main Result

A thought experiment

consider the following hypothetic forger F: G is partitioned into two sets:

Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set

to forge a signature for m, F makes arbitrary RO queries H(m, Ai) = ci and returns a forgery for the first query such that AiX ci ∈ Γgood (or fails to forge if there is no such query) success probability of F if it makes qh RO queries:

for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh

we will call such a F a µ-good forger

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28

slide-81
SLIDE 81

Main Result

A thought experiment

consider the following hypothetic forger F: G is partitioned into two sets:

Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set

to forge a signature for m, F makes arbitrary RO queries H(m, Ai) = ci and returns a forgery for the first query such that AiX ci ∈ Γgood (or fails to forge if there is no such query) success probability of F if it makes qh RO queries:

for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh

we will call such a F a µ-good forger

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28

slide-82
SLIDE 82

Main Result

A thought experiment

consider the following hypothetic forger F: G is partitioned into two sets:

Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set

to forge a signature for m, F makes arbitrary RO queries H(m, Ai) = ci and returns a forgery for the first query such that AiX ci ∈ Γgood (or fails to forge if there is no such query) success probability of F if it makes qh RO queries:

for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh

we will call such a F a µ-good forger

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28

slide-83
SLIDE 83

Main Result

A thought experiment

consider the following hypothetic forger F: G is partitioned into two sets:

Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set

to forge a signature for m, F makes arbitrary RO queries H(m, Ai) = ci and returns a forgery for the first query such that AiX ci ∈ Γgood (or fails to forge if there is no such query) success probability of F if it makes qh RO queries:

for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh

we will call such a F a µ-good forger

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28

slide-84
SLIDE 84

Main Result

A thought experiment

consider the following hypothetic forger F: G is partitioned into two sets:

Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set

to forge a signature for m, F makes arbitrary RO queries H(m, Ai) = ci and returns a forgery for the first query such that AiX ci ∈ Γgood (or fails to forge if there is no such query) success probability of F if it makes qh RO queries:

for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh

we will call such a F a µ-good forger

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28

slide-85
SLIDE 85

Main Result

A thought experiment

consider the following hypothetic forger F: G is partitioned into two sets:

Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set

to forge a signature for m, F makes arbitrary RO queries H(m, Ai) = ci and returns a forgery for the first query such that AiX ci ∈ Γgood (or fails to forge if there is no such query) success probability of F if it makes qh RO queries:

for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh

we will call such a F a µ-good forger

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28

slide-86
SLIDE 86

Main Result

A thought experiment

consider the following hypothetic forger F: G is partitioned into two sets:

Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set

to forge a signature for m, F makes arbitrary RO queries H(m, Ai) = ci and returns a forgery for the first query such that AiX ci ∈ Γgood (or fails to forge if there is no such query) success probability of F if it makes qh RO queries:

for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh

we will call such a F a µ-good forger

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28

slide-87
SLIDE 87

Main Result

The new meta-reduction

we define a meta-reduction M which simulates a µ-good forger M builds Γgood and Γbad dynamically and randomly during the simulation as follows:

for each RO query R.H(m, A) = c, define Z = AX c if Z / ∈ Γgood ∪ Γbad, draw a random coin δZ with Pr[δZ = 1] = µ and Pr[δZ = 0] = 1 − µ and add Z to Γgood if δZ = 1 or to Γbad if δZ = 0.

discrete logs of elements of Γgood are obtained thanks to the discrete log

  • racle of M

the forgery index ℓi is distributed according to a (truncated) geometric distribution of parameter µ

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 22 / 28

slide-88
SLIDE 88

Main Result

The new meta-reduction

we define a meta-reduction M which simulates a µ-good forger M builds Γgood and Γbad dynamically and randomly during the simulation as follows:

for each RO query R.H(m, A) = c, define Z = AX c if Z / ∈ Γgood ∪ Γbad, draw a random coin δZ with Pr[δZ = 1] = µ and Pr[δZ = 0] = 1 − µ and add Z to Γgood if δZ = 1 or to Γbad if δZ = 0.

discrete logs of elements of Γgood are obtained thanks to the discrete log

  • racle of M

the forgery index ℓi is distributed according to a (truncated) geometric distribution of parameter µ

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 22 / 28

slide-89
SLIDE 89

Main Result

The new meta-reduction

we define a meta-reduction M which simulates a µ-good forger M builds Γgood and Γbad dynamically and randomly during the simulation as follows:

for each RO query R.H(m, A) = c, define Z = AX c if Z / ∈ Γgood ∪ Γbad, draw a random coin δZ with Pr[δZ = 1] = µ and Pr[δZ = 0] = 1 − µ and add Z to Γgood if δZ = 1 or to Γbad if δZ = 0.

discrete logs of elements of Γgood are obtained thanks to the discrete log

  • racle of M

the forgery index ℓi is distributed according to a (truncated) geometric distribution of parameter µ

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 22 / 28

slide-90
SLIDE 90

Main Result

The new meta-reduction

we define a meta-reduction M which simulates a µ-good forger M builds Γgood and Γbad dynamically and randomly during the simulation as follows:

for each RO query R.H(m, A) = c, define Z = AX c if Z / ∈ Γgood ∪ Γbad, draw a random coin δZ with Pr[δZ = 1] = µ and Pr[δZ = 0] = 1 − µ and add Z to Γgood if δZ = 1 or to Γbad if δZ = 0.

discrete logs of elements of Γgood are obtained thanks to the discrete log

  • racle of M

the forgery index ℓi is distributed according to a (truncated) geometric distribution of parameter µ

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 22 / 28

slide-91
SLIDE 91

Main Result

The new meta-reduction

we define a meta-reduction M which simulates a µ-good forger M builds Γgood and Γbad dynamically and randomly during the simulation as follows:

for each RO query R.H(m, A) = c, define Z = AX c if Z / ∈ Γgood ∪ Γbad, draw a random coin δZ with Pr[δZ = 1] = µ and Pr[δZ = 0] = 1 − µ and add Z to Γgood if δZ = 1 or to Γbad if δZ = 0.

discrete logs of elements of Γgood are obtained thanks to the discrete log

  • racle of M

the forgery index ℓi is distributed according to a (truncated) geometric distribution of parameter µ

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 22 / 28

slide-92
SLIDE 92

Main Result

The new meta-reduction

we define a meta-reduction M which simulates a µ-good forger M builds Γgood and Γbad dynamically and randomly during the simulation as follows:

for each RO query R.H(m, A) = c, define Z = AX c if Z / ∈ Γgood ∪ Γbad, draw a random coin δZ with Pr[δZ = 1] = µ and Pr[δZ = 0] = 1 − µ and add Z to Γgood if δZ = 1 or to Γbad if δZ = 0.

discrete logs of elements of Γgood are obtained thanks to the discrete log

  • racle of M

the forgery index ℓi is distributed according to a (truncated) geometric distribution of parameter µ

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 22 / 28

slide-93
SLIDE 93

Main Result

M “almost always” simulates a µ-good forger

the size of Γgood defined by M follows a binomial distribution of parameters (|G|, µ) ⇒ by a Chernoff bound, |Γgood| ≃ µ|G| with overwhelming probability in that case, the success probability of the simulated forger satisfies: εF = 1 − (1 − µ)qh by setting µ appropriately, M can simulate a forger achieving the required success probability εF

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 23 / 28

slide-94
SLIDE 94

Main Result

M “almost always” simulates a µ-good forger

the size of Γgood defined by M follows a binomial distribution of parameters (|G|, µ) ⇒ by a Chernoff bound, |Γgood| ≃ µ|G| with overwhelming probability in that case, the success probability of the simulated forger satisfies: εF = 1 − (1 − µ)qh by setting µ appropriately, M can simulate a forger achieving the required success probability εF

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 23 / 28

slide-95
SLIDE 95

Main Result

M “almost always” simulates a µ-good forger

the size of Γgood defined by M follows a binomial distribution of parameters (|G|, µ) ⇒ by a Chernoff bound, |Γgood| ≃ µ|G| with overwhelming probability in that case, the success probability of the simulated forger satisfies: εF = 1 − (1 − µ)qh by setting µ appropriately, M can simulate a forger achieving the required success probability εF

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 23 / 28

slide-96
SLIDE 96

Main Result

Probability of event Bad

event Bad happens only if some execution forks from a previous one at the forgery point, and the new answer c′ is such that Z ′ = A

βℓi i

X c′

i

is fresh and is put in Γgood ⇒ probability less than µ for each execution probability of Bad: Pr[Bad] ≤ nµ ≤ n g(εF)qh hence to have Pr[Bad] ≃ 1 one must have n ≃ g(εF)qh and so ρR/ρF ≃ f (εF)qh

(mi, Xi, ωi) Aβ1

i

c1 Aβ2

i

c2 Aβ3

i

A

βℓi i

cℓi A

βqh i

A

βℓi +1 i+1

A

βℓi +2 i+1

A

βqh i+1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 24 / 28

slide-97
SLIDE 97

Main Result

Probability of event Bad

event Bad happens only if some execution forks from a previous one at the forgery point, and the new answer c′ is such that Z ′ = A

βℓi i

X c′

i

is fresh and is put in Γgood ⇒ probability less than µ for each execution probability of Bad: Pr[Bad] ≤ nµ ≤ n g(εF)qh hence to have Pr[Bad] ≃ 1 one must have n ≃ g(εF)qh and so ρR/ρF ≃ f (εF)qh

(mi, Xi, ωi) Aβ1

i

c1 Aβ2

i

c2 Aβ3

i

A

βℓi i

cℓi A

βqh i

A

βℓi +1 i+1

A

βℓi +2 i+1

A

βqh i+1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 24 / 28

slide-98
SLIDE 98

Main Result

Probability of event Bad

event Bad happens only if some execution forks from a previous one at the forgery point, and the new answer c′ is such that Z ′ = A

βℓi i

X c′

i

is fresh and is put in Γgood ⇒ probability less than µ for each execution probability of Bad: Pr[Bad] ≤ nµ ≤ n g(εF)qh hence to have Pr[Bad] ≃ 1 one must have n ≃ g(εF)qh and so ρR/ρF ≃ f (εF)qh

(mi, Xi, ωi) Aβ1

i

c1 Aβ2

i

c2 Aβ3

i

A

βℓi i

cℓi A

βqh i

A

βℓi +1 i+1

A

βℓi +2 i+1

A

βqh i+1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 24 / 28

slide-99
SLIDE 99

Main Result

Probability of event Bad

event Bad happens only if some execution forks from a previous one at the forgery point, and the new answer c′ is such that Z ′ = A

βℓi i

X c′

i

is fresh and is put in Γgood ⇒ probability less than µ for each execution probability of Bad: Pr[Bad] ≤ nµ ≤ n g(εF)qh hence to have Pr[Bad] ≃ 1 one must have n ≃ g(εF)qh and so ρR/ρF ≃ f (εF)qh

(mi, Xi, ωi) Aβ1

i

c1 Aβ2

i

c2 Aβ3

i

A

βℓi i

cℓi A

βqh i

A

βℓi +1 i+1

A

βℓi +2 i+1

A

βqh i+1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 24 / 28

slide-100
SLIDE 100

Main Result

Probability of event Bad

event Bad happens only if some execution forks from a previous one at the forgery point, and the new answer c′ is such that Z ′ = A

βℓi i

X c′

i

is fresh and is put in Γgood ⇒ probability less than µ for each execution probability of Bad: Pr[Bad] ≤ nµ ≤ n g(εF)qh hence to have Pr[Bad] ≃ 1 one must have n ≃ g(εF)qh and so ρR/ρF ≃ f (εF)qh

(mi, Xi, ωi) Aβ1

i

c1 Aβ2

i

c2 Aβ3

i

A

βℓi i

cℓi A

βqh i

A

βℓi +1 i+1

A

βℓi +2 i+1

A

βqh i+1

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 24 / 28

slide-101
SLIDE 101

Main Result

Expected-time and queries forgers

considering forgers whose expected number of queries is upper bounded by qh makes the analysis much easier the meta-reduction now simulates a forger which makes an a priori unbounded number of RO queries H(m, Ai) = ci until there is a query such that AiX ci ∈ Γgood if |Γgood| = µ|G|, the forgery index ℓ has a geometric distribution of parameter µ it follows that E(#RO queries) = 1/µ ⇒ one can simply set µ = 1/qh this shows that any algebraic reduction must lose a factor qh independently of εF

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 25 / 28

slide-102
SLIDE 102

Main Result

Expected-time and queries forgers

considering forgers whose expected number of queries is upper bounded by qh makes the analysis much easier the meta-reduction now simulates a forger which makes an a priori unbounded number of RO queries H(m, Ai) = ci until there is a query such that AiX ci ∈ Γgood if |Γgood| = µ|G|, the forgery index ℓ has a geometric distribution of parameter µ it follows that E(#RO queries) = 1/µ ⇒ one can simply set µ = 1/qh this shows that any algebraic reduction must lose a factor qh independently of εF

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 25 / 28

slide-103
SLIDE 103

Main Result

Expected-time and queries forgers

considering forgers whose expected number of queries is upper bounded by qh makes the analysis much easier the meta-reduction now simulates a forger which makes an a priori unbounded number of RO queries H(m, Ai) = ci until there is a query such that AiX ci ∈ Γgood if |Γgood| = µ|G|, the forgery index ℓ has a geometric distribution of parameter µ it follows that E(#RO queries) = 1/µ ⇒ one can simply set µ = 1/qh this shows that any algebraic reduction must lose a factor qh independently of εF

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 25 / 28

slide-104
SLIDE 104

Main Result

Expected-time and queries forgers

considering forgers whose expected number of queries is upper bounded by qh makes the analysis much easier the meta-reduction now simulates a forger which makes an a priori unbounded number of RO queries H(m, Ai) = ci until there is a query such that AiX ci ∈ Γgood if |Γgood| = µ|G|, the forgery index ℓ has a geometric distribution of parameter µ it follows that E(#RO queries) = 1/µ ⇒ one can simply set µ = 1/qh this shows that any algebraic reduction must lose a factor qh independently of εF

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 25 / 28

slide-105
SLIDE 105

Main Result

Expected-time and queries forgers

considering forgers whose expected number of queries is upper bounded by qh makes the analysis much easier the meta-reduction now simulates a forger which makes an a priori unbounded number of RO queries H(m, Ai) = ci until there is a query such that AiX ci ∈ Γgood if |Γgood| = µ|G|, the forgery index ℓ has a geometric distribution of parameter µ it follows that E(#RO queries) = 1/µ ⇒ one can simply set µ = 1/qh this shows that any algebraic reduction must lose a factor qh independently of εF

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 25 / 28

slide-106
SLIDE 106

Main Result

Extensions

The result can be extended in three ways: excluding tight reductions from the OMDL problem to forging Schnorr signatures (under the OMDL assumption) extension to generalized Schnorr signatures built from any one-way group homomorphism (Guillou-Quisquater, Okamoto. . . ): ⇒ any reduction from the inversion problem for the group homomorphism must lose a factor qh, assuming the One More Inversion problem is hard extension to variants of Schnorr signatures, e.g. Modified ElGamal of [PS00]

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 26 / 28

slide-107
SLIDE 107

Main Result

Extensions

The result can be extended in three ways: excluding tight reductions from the OMDL problem to forging Schnorr signatures (under the OMDL assumption) extension to generalized Schnorr signatures built from any one-way group homomorphism (Guillou-Quisquater, Okamoto. . . ): ⇒ any reduction from the inversion problem for the group homomorphism must lose a factor qh, assuming the One More Inversion problem is hard extension to variants of Schnorr signatures, e.g. Modified ElGamal of [PS00]

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 26 / 28

slide-108
SLIDE 108

Main Result

Extensions

The result can be extended in three ways: excluding tight reductions from the OMDL problem to forging Schnorr signatures (under the OMDL assumption) extension to generalized Schnorr signatures built from any one-way group homomorphism (Guillou-Quisquater, Okamoto. . . ): ⇒ any reduction from the inversion problem for the group homomorphism must lose a factor qh, assuming the One More Inversion problem is hard extension to variants of Schnorr signatures, e.g. Modified ElGamal of [PS00]

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 26 / 28

slide-109
SLIDE 109

Main Result

Extensions

The result can be extended in three ways: excluding tight reductions from the OMDL problem to forging Schnorr signatures (under the OMDL assumption) extension to generalized Schnorr signatures built from any one-way group homomorphism (Guillou-Quisquater, Okamoto. . . ): ⇒ any reduction from the inversion problem for the group homomorphism must lose a factor qh, assuming the One More Inversion problem is hard extension to variants of Schnorr signatures, e.g. Modified ElGamal of [PS00]

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 26 / 28

slide-110
SLIDE 110

Conclusion

Conclusion

Bottomline The Forking Lemma is optimal (for black-box, algebraic reductions). interpretation of the result: points out the limitations of black-box reduction techniques rather than a real hardness gap

  • pen problems:

what about arbitrary reductions (not nec. algebraic)? what about non black-box reductions? what about reductions to other problems? build an efficient signature scheme with a tight reduction to the DL problem (even in the ROM this seems difficult)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 27 / 28

slide-111
SLIDE 111

Conclusion

Conclusion

Bottomline The Forking Lemma is optimal (for black-box, algebraic reductions). interpretation of the result: points out the limitations of black-box reduction techniques rather than a real hardness gap

  • pen problems:

what about arbitrary reductions (not nec. algebraic)? what about non black-box reductions? what about reductions to other problems? build an efficient signature scheme with a tight reduction to the DL problem (even in the ROM this seems difficult)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 27 / 28

slide-112
SLIDE 112

Conclusion

Conclusion

Bottomline The Forking Lemma is optimal (for black-box, algebraic reductions). interpretation of the result: points out the limitations of black-box reduction techniques rather than a real hardness gap

  • pen problems:

what about arbitrary reductions (not nec. algebraic)? what about non black-box reductions? what about reductions to other problems? build an efficient signature scheme with a tight reduction to the DL problem (even in the ROM this seems difficult)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 27 / 28

slide-113
SLIDE 113

Conclusion

Conclusion

Bottomline The Forking Lemma is optimal (for black-box, algebraic reductions). interpretation of the result: points out the limitations of black-box reduction techniques rather than a real hardness gap

  • pen problems:

what about arbitrary reductions (not nec. algebraic)? what about non black-box reductions? what about reductions to other problems? build an efficient signature scheme with a tight reduction to the DL problem (even in the ROM this seems difficult)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 27 / 28

slide-114
SLIDE 114

Conclusion

Conclusion

Bottomline The Forking Lemma is optimal (for black-box, algebraic reductions). interpretation of the result: points out the limitations of black-box reduction techniques rather than a real hardness gap

  • pen problems:

what about arbitrary reductions (not nec. algebraic)? what about non black-box reductions? what about reductions to other problems? build an efficient signature scheme with a tight reduction to the DL problem (even in the ROM this seems difficult)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 27 / 28

slide-115
SLIDE 115

Conclusion

Conclusion

Bottomline The Forking Lemma is optimal (for black-box, algebraic reductions). interpretation of the result: points out the limitations of black-box reduction techniques rather than a real hardness gap

  • pen problems:

what about arbitrary reductions (not nec. algebraic)? what about non black-box reductions? what about reductions to other problems? build an efficient signature scheme with a tight reduction to the DL problem (even in the ROM this seems difficult)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 27 / 28

slide-116
SLIDE 116

Conclusion

Conclusion

Bottomline The Forking Lemma is optimal (for black-box, algebraic reductions). interpretation of the result: points out the limitations of black-box reduction techniques rather than a real hardness gap

  • pen problems:

what about arbitrary reductions (not nec. algebraic)? what about non black-box reductions? what about reductions to other problems? build an efficient signature scheme with a tight reduction to the DL problem (even in the ROM this seems difficult)

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 27 / 28

slide-117
SLIDE 117

Thanks

The end. . .

Thanks for your attention! Comments or questions?

Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 28 / 28