CSE442T Introduction to Cryptography (Lecture 19)
Chapter 5: Authentication
One-Time Secure Digital Signature
Definition 136.2 (Security of Digital Signature)
A digital signature scheme is is secure if for all n.u.p.p.t. , there exists a negligible function such that ,
A digital signature scheme is one-time secure if it is secure and the adversary makes only one query to the signing oracle.
Lamport’s One-Time Signature
Given a one-way function , we can create a signature scheme as follows:
We construct a key pair as follows:
is two list of random bits,
where
and .
is the image of under , i.e. .
where
and .
To sign a message , we output the signature .
To verify a signature on , we check if .
This is not more than one-time secure since the adversary can ask oracle for and to reveal list and to sign any message.
We will show it is one-time secure
Ideas of proof:
Say their query is and reveals .
Now must sign . There must be a 1, somewhere in the message. Say the th bit is the first 1. then they need to produce such that , which inverts the one-way function.
Proof of one-time security:
Suppose there exists an adversary that can produce a valid signature on a different message after one query to oracle with non-negligible probability .
We will design a function which use to invert the one-way function with non-negligible probability.
Let be a random variable, .
B: input is and . Our goal is to find such that .
Create 2 lists:
Then we pick a random . ( possibilities)
Replace with .
Return with None.
Run on input and . It will query on some message .
Case 1:
We can answer with all of
Case 2:
We must abort we don’t know what to do.
Since outputs with non-negligible probability, we are hoping that . Then it’s attempting to provide
Since differs at most 1 bit from , we have with probability .
Check if . If so, output . (all correct with prob )
If not, try again.
inverts with prob
Collision Resistant Hash Functions (CRHF)
We now have one-time secure signature scheme.
We want one-time secure signature scheme that increase the size of messages relative to the keys.
Let be a family of CRHF if
Easy to pick:
: outputs (p,p,t)
Compression
for each
Easy to compute:
Can computer with a p.p.t
Collision resistant:
, ,
CRHF implies one-way function.
But not the other way around. (CRHF is a stronger notion than one-way function.)