skip to main content
10.1145/800061.808774acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Strong signature schemes

Published:01 December 1983Publication History

ABSTRACT

The notion of digital signature based on trapdoor functions has been introduced by Diffie and Hellman[3]. Rivest, Shamir and Adleman[8] gave the first number theoretic implementation of a signature scheme based on a trapdoor function. If f is a trapdoor function and m a message, f−1(m) is the signature of m. The signature can be verified by computing f(f−1(m)) = m. This approach presents the following problems even when f is hard to invert:

1) there may be special message spaces (or subsets of them) that are easy to sign without knowing the trapdoor information

2) it is possible to forge the signature of random numbers; this violates the requirements of many protocols

3) given a polynomial number of signed messages, it may be possible to sign a new one without knowing the trapdoor information.

We solve the above problems by exhibiting two signature schemes for which any strategy of an adversary, who has seen all previously signed messages, that has a moderate success in forging even a single additional signature, is transformable to a fast algorithm for factoring or inverting the RSA function. This provably holds for all message spaces with all possible Probability distributions. Thus, in particular, given the signature of m, forging the signature of m+1 or 2m or 2sm is as hard as factoring. The two signature schemes

References

  1. 1.M. Blum, "Coin flipping by telephone", Proc. of IEEE, Spring Comp Con. 1982, 133-137.Google ScholarGoogle Scholar
  2. 2.L. Blum, M. Blum, M. Shub, "A Simple Secure Pseudo Random Number Generator", Crypto 1982.Google ScholarGoogle Scholar
  3. 3.R. DeMillo, N. Lynch, and M. Merritt, "Cryptographic protocols", Proc. 14th Ann. ACM Symp. on Th. of Comp., San Francisco, California, May 1982, 383-400. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.W. Diffie and M.E. Hellman, "New directions in cryptography", IEEE Trans. on Inform. Th. 22 (1976), 644-654.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.S. Goldwasser and S. Micali, "Probabilistic encryption and how to play mental poker keeping secret all partial information", Proc. 14th Ann. ACM Symp. on Theory of Computing, May 1982, San Francisco, California, 365-377. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.S. Goldwasser, S. Micali, and P. Tong, "How to establish a private code on a public network", Proc. 23rd Ann. IEEE Symp. on Found. of Comp. Sci., Oct. 1982, Chicago, Illinois.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.M. Rabin, "Digitalized signatures and public-key functions as intractable as factorization", in MIT/LCS/TR-212, MIT Technical Memo, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.M. Rabin, "Digitalized signatures", in Foundations of Secure Computations, edited by R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, Academic Press, 1978, 155-168.Google ScholarGoogle Scholar
  9. 9.R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems", Comm. ACM 21 (1978), 120-126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.A. Shamir, "On the generation of cryptographically strong pseudo-random sequences", ICALP 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.A. Yao, "Theory and Applications of Trapdoor Functions", Proc. 23rd Ann. IEEE Symp. on Found. of Comp. Sci., Oct. 1982, Chicago, Illinois.Google ScholarGoogle Scholar

Index Terms

  1. Strong signature schemes

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            STOC '83: Proceedings of the fifteenth annual ACM symposium on Theory of computing
            December 1983
            487 pages

            Copyright © 1983 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 December 1983

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate1,469of4,586submissions,32%

            Upcoming Conference

            STOC '24
            56th Annual ACM Symposium on Theory of Computing (STOC 2024)
            June 24 - 28, 2024
            Vancouver , BC , Canada

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader