Used to bring authenticity in pk-encryption setting.

Properties:

  • publicly verifiable
  • transferable
  • non-repudiation

Definition: Digital signature scheme consists of three PPT algorithms:

Signature experiment: :

  • is run to obtain
  • has access to oracle, and outputs . Let be set of all queries by .
  • succeeds if and .

Hash-and-Sign paradigm: use a hash when a signature scheme of length is available, and messages are of longer length to create a digest of length as where .

rsa signatures

TODO

PKI

Digital Certificate: just a notion of public key signature binding the identity of a public entity to that public key.

Party signature should be trustworthy to be considered a certificate, and is generally known as Certificate authority (CA). Certificate can be used to build trust between two strange parties using a trusted party that notarises that indeed is the owner of the key.

  • Can build a web of trust using single CA, but susceptible to attacks and single point of failure.
  • Multiple CAs are usually configured on every browser, network devices which helps to decentralise the power a CA has.
  • Certificate Chain is employed where any root authority with a certificate gives power to the party to issue certificates as a proxy.
  • PGP: complete cypherpunk approach to web of trust. Anyone can issue a certificate for anyone else, and recipient has to choose whether to believe the authority issuing the certificate.
  • Revocation of certificates: using expiration or Certificate expiration list broadcasted by CA at periodic time.