On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model
Yannick Seurin
ANSSI, France
18 April, EUROCRYPT 2012
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 1 / 28
On the Exact Security of Schnorr-Type Signatures in the Random - - PowerPoint PPT Presentation
On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model Yannick Seurin ANSSI, France 18 April, EUROCRYPT 2012 Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 1 / 28 Introduction Introduction
ANSSI, France
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 1 / 28
Introduction
a q1/2
h
factor (Paillier and Vergnaud, AC 2005) a q2/3
h
factor (Garg, Bhaskar, and Lokam, CRYPTO 2008)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 2 / 28
Introduction
a q1/2
h
factor (Paillier and Vergnaud, AC 2005) a q2/3
h
factor (Garg, Bhaskar, and Lokam, CRYPTO 2008)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 2 / 28
Introduction
a q1/2
h
factor (Paillier and Vergnaud, AC 2005) a q2/3
h
factor (Garg, Bhaskar, and Lokam, CRYPTO 2008)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 2 / 28
Introduction
a q1/2
h
factor (Paillier and Vergnaud, AC 2005) a q2/3
h
factor (Garg, Bhaskar, and Lokam, CRYPTO 2008)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 2 / 28
Introduction
a q1/2
h
factor (Paillier and Vergnaud, AC 2005) a q2/3
h
factor (Garg, Bhaskar, and Lokam, CRYPTO 2008)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 2 / 28
Introduction
a q1/2
h
factor (Paillier and Vergnaud, AC 2005) a q2/3
h
factor (Garg, Bhaskar, and Lokam, CRYPTO 2008)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 2 / 28
Introduction
a q1/2
h
factor (Paillier and Vergnaud, AC 2005) a q2/3
h
factor (Garg, Bhaskar, and Lokam, CRYPTO 2008)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 2 / 28
Outline
1
2
3
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 3 / 28
Schnorr Signatures and The Forking Lemma
1
2
3
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 4 / 28
Schnorr Signatures and The Forking Lemma
a ∈r Zq, A = Ga (commitment)
A=Ga
− − − − − − − − − → c = H(m, A) (challenge)
c
← − − − − − − − − − s = a + cx mod q (answer)
s=a+cx
− − − − − − − − − → signature is (s, c)
A = GsX −c check H(m, A) = c
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28
Schnorr Signatures and The Forking Lemma
a ∈r Zq, A = Ga (commitment)
A=Ga
− − − − − − − − − → c = H(m, A) (challenge)
c
← − − − − − − − − − s = a + cx mod q (answer)
s=a+cx
− − − − − − − − − → signature is (s, c)
A = GsX −c check H(m, A) = c
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28
Schnorr Signatures and The Forking Lemma
a ∈r Zq, A = Ga (commitment)
A=Ga
− − − − − − − − − → c = H(m, A) (challenge)
c
← − − − − − − − − − s = a + cx mod q (answer)
s=a+cx
− − − − − − − − − → signature is (s, c)
A = GsX −c check H(m, A) = c
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28
Schnorr Signatures and The Forking Lemma
a ∈r Zq, A = Ga (commitment)
A=Ga
− − − − − − − − − → c = H(m, A) (challenge)
c
← − − − − − − − − − s = a + cx mod q (answer)
s=a+cx
− − − − − − − − − → signature is (s, c)
A = GsX −c check H(m, A) = c
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28
Schnorr Signatures and The Forking Lemma
a ∈r Zq, A = Ga (commitment)
A=Ga
− − − − − − − − − → c = H(m, A) (challenge)
c
← − − − − − − − − − s = a + cx mod q (answer)
s=a+cx
− − − − − − − − − → signature is (s, c)
A = GsX −c check H(m, A) = c
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28
Schnorr Signatures and The Forking Lemma
a ∈r Zq, A = Ga (commitment)
A=Ga
− − − − − − − − − → c = H(m, A) (challenge)
c
← − − − − − − − − − s = a + cx mod q (answer)
s=a+cx
− − − − − − − − − → signature is (s, c)
A = GsX −c check H(m, A) = c
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28
Schnorr Signatures and The Forking Lemma
a ∈r Zq, A = Ga (commitment)
A=Ga
− − − − − − − − − → c = H(m, A) (challenge)
c
← − − − − − − − − − s = a + cx mod q (answer)
s=a+cx
− − − − − − − − − → signature is (s, c)
A = GsX −c check H(m, A) = c
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28
Schnorr Signatures and The Forking Lemma
a ∈r Zq, A = Ga (commitment)
A=Ga
− − − − − − − − − → c = H(m, A) (challenge)
c
← − − − − − − − − − s = a + cx mod q (answer)
s=a+cx
− − − − − − − − − → signature is (s, c)
A = GsX −c check H(m, A) = c
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28
Schnorr Signatures and The Forking Lemma
a ∈r Zq, A = Ga (commitment)
A=Ga
− − − − − − − − − → c = H(m, A) (challenge)
c
← − − − − − − − − − s = a + cx mod q (answer)
s=a+cx
− − − − − − − − − → signature is (s, c)
A = GsX −c check H(m, A) = c
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28
Schnorr Signatures and The Forking Lemma
a ∈r Zq, A = Ga (commitment)
A=Ga
− − − − − − − − − → c = H(m, A) (challenge)
c
← − − − − − − − − − s = a + cx mod q (answer)
s=a+cx
− − − − − − − − − → signature is (s, c)
A = GsX −c check H(m, A) = c
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28
Schnorr Signatures and The Forking Lemma
a ∈r Zq, A = Ga (commitment)
A=Ga
− − − − − − − − − → c = H(m, A) (challenge)
c
← − − − − − − − − − s = a + cx mod q (answer)
s=a+cx
− − − − − − − − − → signature is (s, c)
A = GsX −c check H(m, A) = c
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28
Schnorr Signatures and The Forking Lemma
a ∈r Zq, A = Ga (commitment)
A=Ga
− − − − − − − − − → c = H(m, A) (challenge)
c
← − − − − − − − − − s = a + cx mod q (answer)
s=a+cx
− − − − − − − − − → signature is (s, c)
A = GsX −c check H(m, A) = c
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 5 / 28
Schnorr Signatures and The Forking Lemma
running time tF success probability εF → time-to-success ratio ρF = tF/εF maximal number of RO queries qh
F H (m, X, ω) (s, c) ≤ qh
(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh forgery (sℓ, cℓ) with sℓ = DLog(AℓX cℓ)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 6 / 28
Schnorr Signatures and The Forking Lemma
running time tF success probability εF → time-to-success ratio ρF = tF/εF maximal number of RO queries qh
F H (m, X, ω) (s, c) ≤ qh
(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh forgery (sℓ, cℓ) with sℓ = DLog(AℓX cℓ)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 6 / 28
Schnorr Signatures and The Forking Lemma
running time tF success probability εF → time-to-success ratio ρF = tF/εF maximal number of RO queries qh
F H (m, X, ω) (s, c) ≤ qh
(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh forgery (sℓ, cℓ) with sℓ = DLog(AℓX cℓ)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 6 / 28
Schnorr Signatures and The Forking Lemma
running time tF success probability εF → time-to-success ratio ρF = tF/εF maximal number of RO queries qh
F H (m, X, ω) (s, c) ≤ qh
(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh forgery (sℓ, cℓ) with sℓ = DLog(AℓX cℓ)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 6 / 28
Schnorr Signatures and The Forking Lemma
running time tF success probability εF → time-to-success ratio ρF = tF/εF maximal number of RO queries qh
F H (m, X, ω) (s, c) ≤ qh
(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh forgery (sℓ, cℓ) with sℓ = DLog(AℓX cℓ)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 6 / 28
Schnorr Signatures and The Forking Lemma
F H (m, X, ω) (s, c) X x = DLog(X) R
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 7 / 28
Schnorr Signatures and The Forking Lemma
F R.H (m, X, ω) (s, c) X x = DLog(X) R
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 7 / 28
Schnorr Signatures and The Forking Lemma
F R.H (m, X, ω) (s, c) X x = DLog(X) R
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 7 / 28
Schnorr Signatures and The Forking Lemma
(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 8 / 28
Schnorr Signatures and The Forking Lemma
(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 8 / 28
Schnorr Signatures and The Forking Lemma
(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 8 / 28
Schnorr Signatures and The Forking Lemma
(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 8 / 28
Schnorr Signatures and The Forking Lemma
(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 8 / 28
Schnorr Signatures and The Forking Lemma
(m, X, ω) A1 c1 A2 c2 A3 Aℓ cℓ Aqh
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 8 / 28
Schnorr Signatures and The Forking Lemma
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 9 / 28
Schnorr Signatures and The Forking Lemma
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 9 / 28
Schnorr Signatures and The Forking Lemma
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 9 / 28
Schnorr Signatures and The Forking Lemma
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 9 / 28
Schnorr Signatures and The Forking Lemma
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 9 / 28
Meta-Reductions
1
2
3
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 10 / 28
Meta-Reductions
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 11 / 28
Meta-Reductions
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 11 / 28
Meta-Reductions
M DLog(·) A0, . . . , An DLog(A0), . . . , DLog(An) ≤ n
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 12 / 28
Meta-Reductions
1 · · · Gαk k
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 13 / 28
Meta-Reductions
1 · · · Gαk k
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 13 / 28
Meta-Reductions
1 · · · Gαk k
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 13 / 28
Meta-Reductions
F R.H (m, X, ω) (s, c) ≤ qh A0 DLog(A0) ≤ n R DLog(·) A0, . . . , An DLog(A0), . . . , DLog(An) ≤ n M
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 14 / 28
Meta-Reductions
M.F R.H (m, X, ω) (s, c) ≤ qh A0 DLog(A0) ≤ n R DLog(·) A0, . . . , An DLog(A0), . . . , DLog(An) ≤ n M
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 14 / 28
Meta-Reductions
i , . . . , A βqh i
βℓi i
cℓi i
(mi, Xi, ωi) Aβ1
i
c1 Aβ2
i
c2 Aβ3
i
A
βℓi i
cℓi A
βqh i
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 15 / 28
Meta-Reductions
i , . . . , A βqh i
βℓi i
cℓi i
(mi, Xi, ωi) Aβ1
i
c1 Aβ2
i
c2 Aβ3
i
A
βℓi i
cℓi A
βqh i
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 15 / 28
Meta-Reductions
i , . . . , A βqh i
βℓi i
cℓi i
(mi, Xi, ωi) Aβ1
i
c1 Aβ2
i
c2 Aβ3
i
A
βℓi i
cℓi A
βqh i
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 15 / 28
Meta-Reductions
i , . . . , A βqh i
βℓi i
cℓi i
(mi, Xi, ωi) Aβ1
i
c1 Aβ2
i
c2 Aβ3
i
A
βℓi i
cℓi A
βqh i
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 15 / 28
Meta-Reductions
i X ci i )
i such that
γ′
i
0 = Gγi+a0γ′
i Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 16 / 28
Meta-Reductions
i X ci i )
i such that
γ′
i
0 = Gγi+a0γ′
i Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 16 / 28
Meta-Reductions
i X ci i )
i such that
γ′
i
0 = Gγi+a0γ′
i Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 16 / 28
Meta-Reductions
i X ci i )
i such that
γ′
i
0 = Gγi+a0γ′
i Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 16 / 28
Meta-Reductions
i X ci i )
i such that
γ′
i
0 = Gγi+a0γ′
i Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 16 / 28
Meta-Reductions
i X ci i )
i such that
γ′
i
0 = Gγi+a0γ′
i Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 16 / 28
Meta-Reductions
(mi, Xi, ωi) Aβ1
i
c1 Aβ2
i
c2 Aβ3
i
A
βℓi i
cℓi A
βqh i
A
βℓi +1 i+1
A
βℓi +2 i+1
A
βqh i+1
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 17 / 28
Meta-Reductions
(mi, Xi, ωi) Aβ1
i
c1 Aβ2
i
c2 Aβ3
i
A
βℓi i
cℓi A
βqh i
A
βℓi +1 i+1
A
βℓi +2 i+1
A
βqh i+1
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 17 / 28
Meta-Reductions
(mi, Xi, ωi) Aβ1
i
c1 Aβ2
i
c2 Aβ3
i
A
βℓi i
cℓi A
βqh i
A
βℓi +1 i+1
A
βℓi +2 i+1
A
βqh i+1
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 17 / 28
Meta-Reductions
(mi, Xi, ωi) Aβ1
i
c1 Aβ2
i
c2 Aβ3
i
A
βℓi i
cℓi A
βqh i
A
βℓi +1 i+1
A
βℓi +2 i+1
A
βqh i+1
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 17 / 28
Meta-Reductions
(mi, Xi, ωi) Aβ1
i
c1 Aβ2
i
c2 Aβ3
i
A
βℓi i
cℓi A
βqh i
A
βℓi +1 i+1
A
βℓi +2 i+1
A
βqh i+1
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 17 / 28
Meta-Reductions
(mi, Xi, ωi) Aβ1
i
c1 Aβ2
i
c2 Aβ3
i
A
βℓi i
cℓi A
βqh i
A
βℓi +1 i+1
A
βℓi +2 i+1
A
βqh i+1
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 17 / 28
Meta-Reductions
h
h
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 18 / 28
Meta-Reductions
h
h
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 18 / 28
Meta-Reductions
h
h
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 18 / 28
Meta-Reductions
h
h
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 18 / 28
Meta-Reductions
h
h
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 18 / 28
Meta-Reductions
h
h
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 18 / 28
Main Result
1
2
3
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 19 / 28
Main Result
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 20 / 28
Main Result
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 20 / 28
Main Result
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 20 / 28
Main Result
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 20 / 28
Main Result
Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set
for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28
Main Result
Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set
for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28
Main Result
Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set
for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28
Main Result
Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set
for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28
Main Result
Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set
for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28
Main Result
Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set
for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28
Main Result
Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set
for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28
Main Result
Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set
for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28
Main Result
Γgood of size µ|G|: F can compute discrete logs efficiently for this set Γbad of size (1 − µ)|G|: F cannot compute discrete logs for this set
for each RO query, AiX ci is unif. random in G ⇒ AiX ci ∈ Γgood with proba. µ hence εF = 1 − (1 − µ)qh
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 21 / 28
Main Result
for each RO query R.H(m, A) = c, define Z = AX c if Z / ∈ Γgood ∪ Γbad, draw a random coin δZ with Pr[δZ = 1] = µ and Pr[δZ = 0] = 1 − µ and add Z to Γgood if δZ = 1 or to Γbad if δZ = 0.
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 22 / 28
Main Result
for each RO query R.H(m, A) = c, define Z = AX c if Z / ∈ Γgood ∪ Γbad, draw a random coin δZ with Pr[δZ = 1] = µ and Pr[δZ = 0] = 1 − µ and add Z to Γgood if δZ = 1 or to Γbad if δZ = 0.
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 22 / 28
Main Result
for each RO query R.H(m, A) = c, define Z = AX c if Z / ∈ Γgood ∪ Γbad, draw a random coin δZ with Pr[δZ = 1] = µ and Pr[δZ = 0] = 1 − µ and add Z to Γgood if δZ = 1 or to Γbad if δZ = 0.
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 22 / 28
Main Result
for each RO query R.H(m, A) = c, define Z = AX c if Z / ∈ Γgood ∪ Γbad, draw a random coin δZ with Pr[δZ = 1] = µ and Pr[δZ = 0] = 1 − µ and add Z to Γgood if δZ = 1 or to Γbad if δZ = 0.
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 22 / 28
Main Result
for each RO query R.H(m, A) = c, define Z = AX c if Z / ∈ Γgood ∪ Γbad, draw a random coin δZ with Pr[δZ = 1] = µ and Pr[δZ = 0] = 1 − µ and add Z to Γgood if δZ = 1 or to Γbad if δZ = 0.
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 22 / 28
Main Result
for each RO query R.H(m, A) = c, define Z = AX c if Z / ∈ Γgood ∪ Γbad, draw a random coin δZ with Pr[δZ = 1] = µ and Pr[δZ = 0] = 1 − µ and add Z to Γgood if δZ = 1 or to Γbad if δZ = 0.
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 22 / 28
Main Result
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 23 / 28
Main Result
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 23 / 28
Main Result
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 23 / 28
Main Result
βℓi i
i
(mi, Xi, ωi) Aβ1
i
c1 Aβ2
i
c2 Aβ3
i
A
βℓi i
cℓi A
βqh i
A
βℓi +1 i+1
A
βℓi +2 i+1
A
βqh i+1
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 24 / 28
Main Result
βℓi i
i
(mi, Xi, ωi) Aβ1
i
c1 Aβ2
i
c2 Aβ3
i
A
βℓi i
cℓi A
βqh i
A
βℓi +1 i+1
A
βℓi +2 i+1
A
βqh i+1
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 24 / 28
Main Result
βℓi i
i
(mi, Xi, ωi) Aβ1
i
c1 Aβ2
i
c2 Aβ3
i
A
βℓi i
cℓi A
βqh i
A
βℓi +1 i+1
A
βℓi +2 i+1
A
βqh i+1
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 24 / 28
Main Result
βℓi i
i
(mi, Xi, ωi) Aβ1
i
c1 Aβ2
i
c2 Aβ3
i
A
βℓi i
cℓi A
βqh i
A
βℓi +1 i+1
A
βℓi +2 i+1
A
βqh i+1
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 24 / 28
Main Result
βℓi i
i
(mi, Xi, ωi) Aβ1
i
c1 Aβ2
i
c2 Aβ3
i
A
βℓi i
cℓi A
βqh i
A
βℓi +1 i+1
A
βℓi +2 i+1
A
βqh i+1
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 24 / 28
Main Result
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 25 / 28
Main Result
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 25 / 28
Main Result
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 25 / 28
Main Result
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 25 / 28
Main Result
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 25 / 28
Main Result
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 26 / 28
Main Result
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 26 / 28
Main Result
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 26 / 28
Main Result
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 26 / 28
Conclusion
what about arbitrary reductions (not nec. algebraic)? what about non black-box reductions? what about reductions to other problems? build an efficient signature scheme with a tight reduction to the DL problem (even in the ROM this seems difficult)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 27 / 28
Conclusion
what about arbitrary reductions (not nec. algebraic)? what about non black-box reductions? what about reductions to other problems? build an efficient signature scheme with a tight reduction to the DL problem (even in the ROM this seems difficult)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 27 / 28
Conclusion
what about arbitrary reductions (not nec. algebraic)? what about non black-box reductions? what about reductions to other problems? build an efficient signature scheme with a tight reduction to the DL problem (even in the ROM this seems difficult)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 27 / 28
Conclusion
what about arbitrary reductions (not nec. algebraic)? what about non black-box reductions? what about reductions to other problems? build an efficient signature scheme with a tight reduction to the DL problem (even in the ROM this seems difficult)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 27 / 28
Conclusion
what about arbitrary reductions (not nec. algebraic)? what about non black-box reductions? what about reductions to other problems? build an efficient signature scheme with a tight reduction to the DL problem (even in the ROM this seems difficult)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 27 / 28
Conclusion
what about arbitrary reductions (not nec. algebraic)? what about non black-box reductions? what about reductions to other problems? build an efficient signature scheme with a tight reduction to the DL problem (even in the ROM this seems difficult)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 27 / 28
Conclusion
what about arbitrary reductions (not nec. algebraic)? what about non black-box reductions? what about reductions to other problems? build an efficient signature scheme with a tight reduction to the DL problem (even in the ROM this seems difficult)
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 27 / 28
Thanks
Yannick Seurin (ANSSI) Exact Security of Schnorr Signatures EUROCRYPT 2012 28 / 28