Schnorr signature
For a user with secret key \(x\) and public key \(Y = g^x\).
\(\Sigma\)-protocols
Basically, we may turn any \(\Sigma\)- protocol into a signature scheme. To do that we hash the ,,\(t\)-values'' with a message and use this value as challenge.
Simplified notation - example
\[\sigma = SPoK\{(\alpha, \beta): g^{\alpha} = y \land \hat{g}^{\alpha}g^{\beta} = z\}(M) \] This denotes a signature of knowledge \(\sigma\) under message \(M\), of knowledge of \(\alpha\) and \(\beta\) s.t. the relations \(g^{\alpha} = y\) and \(\hat{g}^{\alpha}g^{\beta} = z\) hold.
Intro
The scheme
By far we discussed:
Privacy?
By far for each identification/signature scheme the verifier knew the identity of the user i.e. a constant and unique, for each user, public key.