On Fri, Oct 23, 2015 at 02:08:58PM -0700, Jeffrey Walton wrote:
> > I would still recommend changing the Java code to use hashed signature. 
> 
> ..so forgive me if I'm missing something obvious (like the use case :)..
> 
> Hashing a message before signing it is one of the earliest public key 
> discoveries and attacks. Bernstein has a very good history on the subject 
> at "RSA signatures and Rabin???Williams signatures: the state of the art", 
> http://cr.yp.to/sigs/rwsota-20080131.pdf.
> 
> My apologies if your problem domain takes you in another direction.

Signatures with no hash applied to the message
is a valid specific problem domain like DAA, U-Prove, Idemix.
Hash is only used there to produce an unpredictable challenge
for non-interactive variant of a proof system.

Consider a message to be a set of user attributes.
No ASN.1 encoding and hashing, just integers.
In case of U-Prove, field elements, residues modulo a prime order of a group.

Hashing attributes together would defeat algebraic relations
at the core of non-interactive proofs,
resulting in no "selective information disclosure" property
of attributes signed.

I'm writing this to avoid over-generalizing hash-and-sign approach.

Vadym Fedyukovych

-- 
-- 
You received this message because you are subscribed to the "Crypto++ Users" 
Google Group.
To unsubscribe, send an email to cryptopp-users-unsubscr...@googlegroups.com.
More information about Crypto++ and this group is available at 
http://www.cryptopp.com.
--- 
You received this message because you are subscribed to the Google Groups 
"Crypto++ Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to cryptopp-users+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to