Back to Search
Start Over
Extended Security Arguments for Signature Schemes
- Source :
- Africacrypt 2012, Africacrypt 2012, Jul 2012, Ifrane, Morocco. pp.19-34, ⟨10.1007/978-3-642-31410-0_2⟩, Progress in Cryptology-AFRICACRYPT 2012 ISBN: 9783642314094, AFRICACRYPT, Designs, Codes and Cryptography, Designs, Codes and Cryptography, 2016, 78 (2), pp.441-461. ⟨10.1007/s10623-014-0009-7⟩, Designs, Codes and Cryptography, Springer Verlag, 2016, 78 (2), pp.441-461. ⟨10.1007/s10623-014-0009-7⟩
- Publication Year :
- 2012
- Publisher :
- HAL CCSD, 2012.
-
Abstract
- It is known how to transform certain canonical three-pass identification schemes into signature schemes via the Fiat---Shamir transform. Pointcheval and Stern showed that those schemes are existentially unforgeable in the random-oracle model leveraging the, at that time, novel forking lemma. Recently, a number of 5-pass identification protocols have been proposed. Extending the above technique to capture 5-pass identification schemes would allow to obtain novel unforgeable signature schemes. In this paper, we provide an extension of the forking lemma (and the Fiat---Shamir transform) in order to assess the security of what we call $$n$$n-generic signature schemes. These include signature schemes that are derived from certain $$(2n+1)$$(2n+1)-pass identification schemes. In doing so, we put forward a generic methodology for proving the security of a number of signature schemes derived from $$(2n+1)$$(2n+1)-pass identification schemes for $$n\ge 2$$n?2. As an application of this methodology, we obtain two new code-based existentially-unforgeable signature schemes, along with a security reduction. In particular, we solve an open problem in multivariate cryptography posed by Sakumoto, Shirai and Hiwatari at CRYPTO 2011.
- Subjects :
- Theoretical computer science
Open problem
0211 other engineering and technologies
Cryptography
0102 computer and information sciences
02 engineering and technology
01 natural sciences
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Code (cryptography)
0202 electrical engineering, electronic engineering, information engineering
Forking lemma
Computer Science::Cryptography and Security
Mathematics
021110 strategic, defence & security studies
business.industry
Applied Mathematics
Extension (predicate logic)
Signature (logic)
Computer Science Applications
Identification (information)
ACM: E.: Data/E.3: DATA ENCRYPTION
010201 computation theory & mathematics
020201 artificial intelligence & image processing
business
Algorithm
Schnorr signature
Multivariate cryptography
Subjects
Details
- Language :
- English
- ISBN :
- 978-3-642-31409-4
- ISSN :
- 09251022 and 15737586
- ISBNs :
- 9783642314094
- Database :
- OpenAIRE
- Journal :
- Africacrypt 2012, Africacrypt 2012, Jul 2012, Ifrane, Morocco. pp.19-34, ⟨10.1007/978-3-642-31410-0_2⟩, Progress in Cryptology-AFRICACRYPT 2012 ISBN: 9783642314094, AFRICACRYPT, Designs, Codes and Cryptography, Designs, Codes and Cryptography, 2016, 78 (2), pp.441-461. ⟨10.1007/s10623-014-0009-7⟩, Designs, Codes and Cryptography, Springer Verlag, 2016, 78 (2), pp.441-461. ⟨10.1007/s10623-014-0009-7⟩
- Accession number :
- edsair.doi.dedup.....945c8b4daea6963298dff9834620ae1a
- Full Text :
- https://doi.org/10.1007/978-3-642-31410-0_2⟩