Multi-user Schnorr security, revisited

Research output: Book/ReportReportAcademic

Abstract

Three recent proposals for standardization of next-generation ECC signatures have included "key prefixing" modifications to Schnorr's signature system. Bernstein, Duif, Lange, Schwabe, and Yang stated in 2011 that key prefixing is "an inexpensive way to alleviate concerns that several public keys could be attacked simultaneously". However, a 2002 theorem by Galbraith, Malone-Lee, and Smart states that, for the classic Schnorr signature system, single-key security tightly implies multi-key security. Struik and then Hamburg, citing this theorem, argued that key prefixing was unnecessary for multi-user security and should not be standardized. This paper identifies an error in the 2002 proof, and an apparently insurmountable obstacle to the claimed theorem. The proof idea does, however, lead to a different theorem, stating that single-key security of the classic Schnorr signature system tightly implies multi-key security of the key-prefixed variant of the system. This produces exactly the opposite conclusion regarding standardization. Keywords: Schnorr signatures, multi-user security, proof errors
Original languageEnglish
PublisherIACR
Number of pages19
Publication statusPublished - 2015

Publication series

NameCryptology ePrint Archive
Volume2015/996

Fingerprint Dive into the research topics of 'Multi-user Schnorr security, revisited'. Together they form a unique fingerprint.

  • Cite this

    Bernstein, D. J. (2015). Multi-user Schnorr security, revisited. (Cryptology ePrint Archive; Vol. 2015/996). IACR.