Digital Signature - Notions of Security

Notions of Security

In their foundational paper, Goldwasser, Micali, and Rivest lay out a hierarchy of attack models against digital signatures:

  1. In a key-only attack, the attacker is only given the public verification key.
  2. In a known message attack, the attacker is given valid signatures for a variety of messages known by the attacker but not chosen by the attacker.
  3. In an adaptive chosen message attack, the attacker first learns signatures on arbitrary messages of the attacker's choice.

They also describe a hierarchy of attack results:

  1. A total break results in the recovery of the signing key.
  2. A universal forgery attack results in the ability to forge signatures for any message.
  3. A selective forgery attack results in a signature on a message of the adversary's choice.
  4. An existential forgery merely results in some valid message/signature pair not already known to the adversary.

The strongest notion of security, therefore, is security against existential forgery under an adaptive chosen message attack.

Read more about this topic:  Digital Signature

Famous quotes containing the words notions of, notions and/or security:

    the full analysis of the notions of saying something and understanding what one said inevitably involves a concept which, as I will show in detail, essentially corresponds to the Cartesian idea of thought.
    Zeno Vendler (b. 1921)

    Even the simple act that we call “going to visit a person of our acquaintance” is in part an intellectual act. We fill the physical appearance of the person we see with all the notions we have about him, and in the totality of our impressions about him, these notions play the most important role.
    Marcel Proust (1871–1922)

    A well-regulated militia being necessary to the security of a free State, the right of the people to keep and bear arms shall not be infringed.
    Second Amendment, U.S. Constitution (1791)