2013
DOI: 10.1007/978-3-642-38348-9_27
|View full text |Cite
|
Sign up to set email alerts
|

Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures

Abstract: Abstract. We revisit the security of Fiat-Shamir signatures in the non-programmable random oracle model. The well-known proof by Pointcheval and Stern for such signature schemes (Journal of Cryptology, 2000) relies on the ability to re-program the random oracle, and it has been unknown if this property is inherent. Pailler and Vergnaud (Asiacrypt 2005) gave some first evidence of the hardness by showing via meta-reduction techniques that algebraic reductions cannot succeed in reducing key-only attacks against … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
24
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 43 publications
(27 citation statements)
references
References 27 publications
1
24
0
Order By: Relevance
“…In particular, they presented an impossibility result for security proofs based on algebraic reductions and the discrete logarithm problem. In a similar vein, Fischlin and Fleischhacker [11] presented a result about the security of Schnorr signatures in the non-programmable random oracle model. Essentially they prove that in the non-programmable ROM [12] no reduction from the discrete logarithm problem can exist that invokes the adversary only ever on the same input.…”
Section: Contributionmentioning
confidence: 93%
“…In particular, they presented an impossibility result for security proofs based on algebraic reductions and the discrete logarithm problem. In a similar vein, Fischlin and Fleischhacker [11] presented a result about the security of Schnorr signatures in the non-programmable random oracle model. Essentially they prove that in the non-programmable ROM [12] no reduction from the discrete logarithm problem can exist that invokes the adversary only ever on the same input.…”
Section: Contributionmentioning
confidence: 93%
“…Interestingly, recently there has been another type of separations based on socalled meta-reduction techniques, originally introduced by Boneh and Venkatenesan [6], and subsequently used in many other places [9,30,22,14,31,15,10,35,12]. Such meta-reductions take an alleged reduction from P to Q and show how to use such a reduction to break the primitive P directly, simulating the adversary for the reduction usually via rewinding techniques.…”
Section: Black-box Separation Techniquesmentioning
confidence: 99%
“…See for a good survey on this topic. Fischlin and Fleischhacker showed a limitation on the meta‐reduction techniques.…”
Section: Introductionmentioning
confidence: 99%