Paper 2013/831

Provable Security Proofs and their Interpretation in the Real World

Vikram Singh

Abstract

This paper analyses provable security proofs, using the EDL signature scheme as its case study, and interprets their benefits and drawbacks when applied to the real world. Provable security has been an area of contention. Some, such as Koblitz and Menezes, give little credit to the potential extra security provided and argue that it is a distracting goal. However, others believe that an algorithm with a security proof is superior to one without it, and are prepared to accept the impact to performance that their use might involve. Goldreich has been notable for his defence of the security proof, and for his opposition to the view of Koblitz and Menezes. This paper is designed to help the reader make their own decisions on security proofs. We achieve this by giving an introduction to the typical security model used, then give a description of the EDL signature scheme and its tight reduction to the CDH problem in the Random Oracle Model, then analyse the proof's assumptions, meaning, validity and overhead for real world security.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint.
Keywords
Provable SecurityEDL Signature SchemeTight ReductionComputational Diffie Hellman problemRandom Oracle Model
Contact author(s)
vs77814 @ gmail com
History
2013-12-16: received
Short URL
https://ia.cr/2013/831
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/831,
      author = {Vikram Singh},
      title = {Provable Security Proofs and their Interpretation in the Real World},
      howpublished = {Cryptology ePrint Archive, Paper 2013/831},
      year = {2013},
      note = {\url{https://eprint.iacr.org/2013/831}},
      url = {https://eprint.iacr.org/2013/831}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.