Cryptology ePrint Archive: Report 2014/696
Security Proofs for the BLT Signature Scheme
Ahto Buldas and Risto Laanoja and Ahto Truu
Abstract: We present security proofs for the BLT signature scheme in the model, where hash functions are built from ideal components (random oracles, ideal ciphers, etc.). We show that certain strengthening of the Pre-image Awareness (PrA) conditions like boundedness of the extractor, and certain natural properties (balancedness and the so-called output one-wayness) of the hash function are sufficient for existential unforgeability of the BLT signature scheme.
Category / Keywords: applications / digital signatures, hash functions
Date: received 4 Sep 2014
Contact author: ahto buldas at guardtime com, risto laanoja@guardtime com, ahto truu@guardtime com
Available format(s): PDF | BibTeX Citation
Version: 20140904:110309 (All versions of this report)
Short URL: ia.cr/2014/696
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]