Fix a signature scheme , an adversary , and security parameter . Define the randomized experiment as:
Definition: A Digital Signature scheme is existentially unforgeable under an adaptive chosen-message attack, or just secure, if for all PPT adversaries , there is a negligible function such that
Let be a signature scheme for messages of length , and let be a hash function with output length .
Construct a signature scheme as follows:
Let be a PPT algorithm that on input outputs a modulus that is the product of two -bit primes (except with negligible probability), along with integers , satisfying .
Define the plain RSA signature scheme as follows.
: On input , run to obtain .
The public key is , and private key is .
: On input a private key and a message ,
Output the signature as .
: On input a public key , a message , and a signature ,
Output if and only if .
Let be a PPT algorithm that on input outputs a modulus that is the product of two -bit primes (except with negligible probability), along with integers , satisfying .
Construct the RSA-FDH signature scheme as follows.
: On input , run to compute .
The public key is and the private key is .
: On input a private key and a message ,
Output .
: On input a public key , a message , and a signature ,
Output if and only if .
— Apr 11, 2023
Made with ❤ at Earth.