Security of Blind Discrete Log Signatures against Interactive Attacks

作者: Claus Peter Schnorr

DOI: 10.1007/3-540-45600-7_1

关键词:

摘要: We present a novel parallel one-more signature forgery against blind Okamoto-Schnorr and Schnorr signatures in which an attacker interacts some l times with legitimate signer produces from these interactions + 1 signatures. Security the new attack requires that following ROS-problem is intractable: find overdetermined, solvable system of linear equations modulo q random inhomogenities (right sides).There inherent weakness security result POINTCHEVAL AND STERN. Theorem 26[PS00] does not cover attacks 4 for elliptic curves order 2200. That would require intractability ROS-problem, plausible but complexity assumption. Conversely, assuming we show are secure oracle generic group model forgery.

参考文章(24)
Claus Peter Schnorr, Security of DL-encryption and signatures against generic attacks—a survey Public-Key Cryptography and Computational Number Theory. ,(2001) , 10.1515/9783110881035.257
Dan Boneh, Richard J. Lipton, Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract) international cryptology conference. pp. 283- 297 ,(1996)
David Pointcheval, Strengthened security for blind signatures theory and application of cryptographic techniques. pp. 391- 405 ,(1998) , 10.1007/BFB0054141
Masayuki Abe, A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures Lecture Notes in Computer Science. pp. 136- 151 ,(2001) , 10.1007/3-540-44987-6_9
Tatsuaki Okamoto, Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes international cryptology conference. pp. 31- 53 ,(1992) , 10.1007/3-540-48071-4_3
David Pointcheval, Jacques Stern, Provably Secure Blind Signature Schemes international cryptology conference. pp. 252- 265 ,(1996) , 10.1007/BFB0034852
Claus Peter Schnorr, Markus Jakobsson, Security of Signed ElGamal Encryption international conference on the theory and application of cryptology and information security. pp. 73- 89 ,(2000) , 10.1007/3-540-44448-3_7
Amos Fiat, Adi Shamir, How to prove yourself: practical solutions to identification and signature problems international cryptology conference. ,vol. 263, pp. 186- 194 ,(1987) , 10.1007/3-540-47721-7_12
Marc Fischlin, A Note on Security Proofs in the Generic Model international conference on the theory and application of cryptology and information security. pp. 458- 469 ,(2000) , 10.1007/3-540-44448-3_35
David Pointcheval, The Composite Discrete Logarithm and Secure Authentication public key cryptography. pp. 113- 128 ,(2000) , 10.1007/978-3-540-46588-1_9