Paper 2013/831
Provable Security Proofs and their Interpretation in the Real World
Vikram Singh
Abstract
This paper analyses provable security proofs, using the EDL signature scheme as its case study, and interprets their benefits and drawbacks when applied to the real world. Provable security has been an area of contention. Some, such as Koblitz and Menezes, give little credit to the potential extra security provided and argue that it is a distracting goal. However, others believe that an algorithm with a security proof is superior to one without it, and are prepared to accept the impact to performance that their use might involve. Goldreich has been notable for his defence of the security proof, and for his opposition to the view of Koblitz and Menezes. This paper is designed to help the reader make their own decisions on security proofs. We achieve this by giving an introduction to the typical security model used, then give a description of the EDL signature scheme and its tight reduction to the CDH problem in the Random Oracle Model, then analyse the proof's assumptions, meaning, validity and overhead for real world security.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Preprint.
- Keywords
- Provable SecurityEDL Signature SchemeTight ReductionComputational Diffie Hellman problemRandom Oracle Model
- Contact author(s)
- vs77814 @ gmail com
- History
- 2013-12-16: received
- Short URL
- https://ia.cr/2013/831
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2013/831, author = {Vikram Singh}, title = {Provable Security Proofs and their Interpretation in the Real World}, howpublished = {Cryptology {ePrint} Archive, Paper 2013/831}, year = {2013}, url = {https://eprint.iacr.org/2013/831} }