Schnorr signatures: everything you wanted to know, but were afraid to ask!

 

tl;dr: Signs $m$ as $\sigma = (R, s)$, where $s = r - H(R, m) \cdot \sk$, $R = g^r$ and $r\randget \Zp$. Verifies this signature against $\pk = g^\sk$ as $R \equals g^s \cdot \pk^{H(R, m)}$.

A bit of history

The Schnorr signature scheme was originally introduced by Claus-Peter Schnorr, a German mathematician, in a CRYPTO’89 paper1. In the paper, Schnorr first proposes an identification scheme which he then turns into a signature scheme using the well-known Fiat-Shamir transform2. The original paper describes the signature scheme assuming a specific choice of Abelian group: a prime-order $q$ subgroup of $\Zps$, where $p$ is a prime. Later work naturally observed that any prime-order group suffices (e.g., elliptic curve groups)3.

Schnorr patented his scheme in 1990. This was likely the biggest reason why Bitcoin, and the rest of the cryptocurrency space, (unfortunately?) chose ECDSA as its signature scheme, instead of Schnorr, which is simpler, more efficient and easier to thresholdize into a $t$-out-of-$n$ scheme. In 2010, once the patent expired, Schnorr became more popular.

Much like ECDSA, (some variants of) Schnorr signatures support public key recovery, which Bitcoin leverages in P2PKH mode4 to keep TXN signatures smaller. (Bitcoin has leveraged P2PKH since the beginning, it seems5.)

Preliminaries

  • We assume a group $\Gr$ of prime order $p$ and a finite field $\Zp$
  • Let $g$ denote the generator of $\Gr$
  • We assume a collision-resistant hash function $H : \Gr \times \{0,1\}^* \rightarrow \Zp$.

The Schnorr signature scheme

$\mathsf{Schnorr}$.$\mathsf{KeyGen}(1^\lambda) \rightarrow (\sk, \pk)$:

  • $\sk\randget\Zp$
  • $\pk \gets g^\sk$

$\mathsf{Schnorr}$.$\mathsf{Sign}(m, \sk) \rightarrow \sigma$:

  • $r\randget\Zp$
  • $R \gets g^r$
  • $s \gets (r - H(R, m) \cdot \sk) \bmod p$
  • $\sigma\gets (R, s)$

Note: It is also possible to use a $+$ instead of a $-$ when computing $s$. The verification equation can be adjusted to account for it (e.g., see EdDSA below).

$\mathsf{Schnorr}$.$\mathsf{Verify}(m, \pk, \sigma) \rightarrow \{0,1\}$:

  • $(R, s) \gets \sigma$
  • assert $R \equals g^s \cdot \pk^{H(R, m)}$

Correctness

The scheme is correct if signatures created via $\mathsf{Schnorr.Sign}$ verify correctly via $\mathsf{Schnorr.Verify}$.

Let’s see why this holds: \begin{align} \label{eq:schnorr-verify} R &\equals g^s \cdot \pk^{H(R, m)}\Leftrightarrow\\
g^r &\equals g^{r-H(R, m)\cdot \sk} \cdot (g^\sk)^{H(R, m)}\Leftrightarrow\\
g^r &\equals g^{r-H(R, m)\cdot \sk} \cdot g^{H(R, m) \cdot \sk}\Leftrightarrow\\
g^r &\equals g^r \end{align}

Pubkey recovery

In most use cases, the signature verifier has the public key $\pk$ of the signer and can simply call $\mathsf{Schnorr}.\mathsf{Verify}(m,\pk, \sigma)$ to check a signature $\sigma$ on a message $m$. However, in some settings, the verifier might actually not have the public key. For example, in blockchain settings, the verifier (i.e., the validators/miners) might only have a hash $h$ of the public key (i.e., the address)4.

Q: Is it still possbile for such verifiers to still check the signature $\sigma$ on $m$ is correct against the hash $h$ of the public key?

A: Yes! There exists a pubkey recovery algorithm that returns the public key $\pk$ against which $\mathsf{Schnorr}.\mathsf{Verify}(m,\pk, \sigma)$ succeeds. Then, the verifier can simply check that the hash of $\pk$ is $h$!

By reorganizing the verification equation (see Eq. \ref{eq:schnorr-verify}), we can have it “return” the public key under which the signature verifies: \begin{align} R &\equals g^s \cdot \pk^{H(R, m)}\Leftrightarrow\\
(R/g^s) &\equals \pk^{H(R, m)}\Leftrightarrow\\
\left(R/g^s\right)^{\left(H(R,m)^{-1}\right)} &\equals \pk \end{align}

So, the pubkey recovery algorithm is the following:

$\mathsf{Schnorr}$.$\mathsf{PubkeyRecover}(m, \sigma) \rightarrow \pk$:

  • $(R, s) \gets \sigma$
  • $\pk \gets \left(R/g^s\right)^{\left(H(R,m)^{-1}\right)}$

Pubkey recovery does not work for the EdDSA variant of Schnorr, because the public key is hashed in together with the nonce as $H(R, \pk, m)$, to prevent related key attacks6. Put differently, the recovery algorithm would need the pubkey itself in order to recover the pubkey as $\left(R/g^s\right)^{\left(H(R,\pk,m)^{-1}\right)}$, which is non-sensical.

Batch verification

Schnorr signature verification is significantly faster when done in batch, rather than individually via $\mathsf{Schnorr.Verify}$.

Specifically, given $(\sigma_i, m_i, \pk_i)_{i\in [n]}$, one can ensure all signatures verify (i.e., that $\mathsf{Schnorr.Verify}(m_i, \pk_i, \sigma_i) = 1,\forall i\in [n]$) by taking a random linear combination of the verification equations and combining them into one.

More formally, the batch verification algorithm looks like this:

$\mathsf{Schnorr.BatchVerify}((m_i, \pk_i, \sigma_i)_{i\in[n]}) \rightarrow \{0,1\}$:

  • $z_i \randget \{0,1\}^\lambda,\forall i\in[n]$
  • $(R_i, s_i) \gets \sigma_i,\forall i\in[n]$
  • assert $\prod_{i \in [n]} R_i^{-z_i} g^{s_i \cdot z_i} \pk_i^{H(R_i, m_i)\cdot z_i} \equals 1$

The speed-up comes from using multi-exponentiation algorithms such as Bos-Coster or BDL+127 in the last check.

Note: When the public keys are the same (i.e., $\pk_i = \pk, \forall i\in[n]$), then the size of the multi-exponentiation can be reduced, which further speeds up the verification: \begin{align} \left(\prod_{i \in [n]} R_i^{-z_i} g^{s_i \cdot z_i}\right) \pk^{\sum_{i\in[n]} H(R_i, m_i)\cdot z_i} \equals 1 \end{align}

Implementing batch verification so that it returns the same results as individual verification may be trickier than it appears over non-prime order groups like Edwards 255198$^,$9.

Alternative $(e, s)$ formulation

In this formulation, the signature includes the hash $e = H(R, m)$ instead of $R$.

This may have advantages if the hash can be made smaller. The original Schnorr paper1 claims $\lambda$-bit hashes (as opposed to $2\lambda$) are sufficient for $\lambda$-bit security, but not sure if that has changed.

On the other hand, a disadvantage is that this formulation does not allow for more efficient batch verification.

$\mathsf{Schnorr}’$.$\mathsf{Sign}(m, \sk) \rightarrow \sigma$:

  • $r\randget\Zp$
  • $R \gets g^r$
  • $e \gets H(R, m)$
  • $s \gets (r - e \cdot \sk)\bmod p$
  • $\sigma\gets (e, s)$

$\mathsf{Schnorr}’$.$\mathsf{Verify}(m, \pk, \sigma) \rightarrow \{0,1\}$:

  • $(e, s) \gets \sigma$
  • assert $e \equals H(g^s \cdot \pk^e, m)$

EdDSA and Ed25519 formulation

EdDSA

EdDSA is a Schnorr-based signature scheme designed for groups $\Gr$ of non-prime order $p = h\cdot q$, where $q\approx 2^{2\lambda}$ and $h=8$ (but can be generalized to $h=2^c$, for any $c$10). EdDSA has a few modifications for security. In particular, (1) the nonce $r$ is generated pseudo-randomly from the SK and the message $m$ and (2) the signing additionally hashes over the public key and (3) EdDSA has been designed so that the SK can be safely reused in Diffie-Hellman (DH) key exchange protocols like X25519.

EdDSA uses multiple hash functions:

  • $H_1 : \{0,1\}^{2\lambda} \rightarrow \{0,1\}^{4\lambda}$,
  • $H_2 : \{0,1\}^{2\lambda} \times \{0,1\}^* \rightarrow \{0,1\}^{4\lambda}$
  • $H_3 : \Gr \times \Gr \times \{0,1\}^* \rightarrow \{0,1\}^{4\lambda}$

These are typically instantiated from a single hash function $H : \{0,1\}^* \rightarrow \{0,1\}^{4\lambda}$ via proper domain separation.

$\mathsf{EdDSA}$.$\mathsf{KeyGen}(1^\lambda) \rightarrow (\sk, \pk)$:

  • $b \gets 2\lambda$
  • $\vec{k} \randget \{0,1\}^{b}$
  • $\vec{h} \gets H_1(\vec{k}) \in \{0,1\}^{2b}$
  • $a \gets 2^{b-2} + \sum_{3 \le i \le b - 3} 2^i h_i$
  • $\sk \gets (a, (h_b, \ldots h_{2b-1}))$
  • $\pk \gets g^{a}$

What is up with this weird generation of the secret key $a$? tl;dr is that it allows for “the same [Ed25519] secrets [to] also be used safely with X25519 if you also need to do a key-exchange.”11

$\mathsf{EdDSA}$.$\mathsf{Sign}(m, \sk) \rightarrow \sigma$:

  • Parse $(a, (h_b, \ldots h_{2b-1})) \gets \sk$
  • $r \gets H_2(h_b,\ldots, h_{2b-1}, m) \in \{0,1\}^{2b}$
  • $R \gets g^r$
  • $s \gets (r + H_3(R, \pk, m) \cdot a)\bmod q$
  • $\sigma\gets (R, s)$

As per [BDL+12]7 the inclusion of $\pk$ in $H_3$ is “an inexpensive way to alleviate concerns that several public keys could be attacked simultaneously”. Another yet-to-be explored advantage is that it prevents an adversary who is given a target signature $\sigma$ from finding a message $m$ and a public key $\pk$ for which it verifies. For example, this is possible in plain Schnorr where, given any $\sigma$, the adversary can pick any message $m$ it wants and compute the PK as $\pk = (g^s / R)^{1/H(R, m)}$. (In the future, I hope to expand on why such a security notion may be useful.)

$\mathsf{EdDSA}$.$\mathsf{Verify}(m, \pk, \sigma) \rightarrow \{0,1\}$:

  • $(R, s) \gets \sigma$
  • assert $g^s \equals R \cdot \pk^{H(R, \pk, m)}$

An alternative version of the verification function multiplies by the cofactor $h$ in the exponent: $g^{h\cdot s} \equals R^h \cdot \pk^{h\cdot H(R, \pk, m)}$. The subtleties of this are discussed by Henry de Valence8.

Ed25519

Ed25519 is just EdDSA over the Edwards 25519 curve with $\lambda=128$ and an appropriate choice of hash function. This is stated in the EdDSA paper7:

Our recommended curve for EdDSA is a twisted Edwards curve birationally equivalent to the curve Curve25519 […] We use the name Ed25519 for EdDSA with this particular choice of curve.

Typically, the most common flavor of Ed25519 is Ed25519-SHA-512 which uses SHA2-512 as its hash function.

(Mis)implementing Schnorr

Surprisingly, implementing Schnorr signatures can be quite tricky. Previous work explores the many subtleties in depth8$^,$9$^,$10. Instead of rehashing their explanations, I will summarize three main pitfalls to watch out for. (Unfortunately, Ed25519 only handles the first one.)

Pitfall #1: Reusing the nonce $r$

This is the most important pitfall to avoid in Schnorr signatures:

Pitfall: If an implementation produces two signatures that reuse the same $r$, then the secret key can be extracted. Therefore, it is crucial for security that $r$ be sampled randomly.

Recommendation: As we discuss later, picking $r$ pseudorandomly based on the message and the secret key obviates this problem.

We showcase the attack below. Suppose an implementation produces two signatures $\sigma_1 = (R, s_1)$ and $\sigma_2 = (R, s_2)$ on messages $m_1 \ne m_2$, respectively, that reuse the same $r$. Specifically: \begin{align} R &= g^r\\
s_1 &= r + H(R, m_1) \cdot \sk\\
s_2 &= r + H(R, m_2) \cdot \sk \end{align} Then, an attacker can extract $\sk$ as follows: \begin{align} \frac{s_1 - s_2}{H(R, m_1) - H(R, m_2)} &= \frac{H(R, m_1)\sk - H(R, m_2)\sk}{H(R, m_1) - H(R, m_2)}\\
&= \frac{\sk(H(R, m_1) - H(R, m_2))}{H(R, m_1) - H(R, m_2)}\\
&= \sk \end{align}

For this attack to work, the denominator above must be not zero, which happens with overwhelming probability when $m_1\ne m_2$ and $H$ is collision-resistant. This attack works even when using the alternative $(e, s)$ formulation of Schnorr singatures, described later.

Pitfall #2: Biased nonces $r$

Pitfall: If an implementation produces signatures whose nonces $r$ are not uniform in $\Zp$, then the secret key can be extracted. Once again, it is crucial for security that $r$ be sampled randomly.

Recommendation: As we discuss later, picking $r$ pseudorandomly based on the message and the secret key obviates this problem.

We do not showcase the attacks, which rely on solving lattice problems and are similar to attacks on ECDSA12.

Pitfall #3: Non-canonical serialization

Pitfall: The description above and, in fact, most academic descriptions, do not distinguish between a group element and its serialization into bytes. (Same applies to field elements.) Yet developers who implement Schnorr must understand the caveats of (de)serializing these elements to (1) avoid issues such as signature malleability and (2) maintain compatibility with other libraries.

For example, consider the code that deserializes the $s\in \Zp$ component of the Schnor signature. Typically, naively-written code will not check that the positive integer encoded in the bytes is $< p$. As a result, such code will accept two different byte representations of the same $s$. This could allow for one valid Schnorr signature $\sigma$ on $m$ to be mauled by an attacker into another different-but-still-valid signature $\sigma’$ on $m$.

Such malleability attacks might not seem like a big deal: after all, there was already a valid $\sigma$ on $m$, what do we care if someone can create a new $\sigma’$ that’s also valid? Fair enough, but many applications often (incorrectly) assume that a message only has one, unique, valid signature. In the past, such attacks may have been used to drain money from (poorly-implemented) cryptocurrency exchanges13.

Recommendation: Developers need to ensure that each group (or field) element has a single / unique / canonical serialized representation into bytes and that deserialization only accepts this canonical representation. Ristretto25514 is a recently-proposed elliptic curve group that offers canonical (de)serialization.

Pitfall #4: Using non-prime order groups

Pitfall: The description above and, in fact, most academic descriptions, make a crucial assumption: that $\Gr$ is a prime-order group.

Yet, Ed25519, which is the most popular implementation of Schnorr, does not use prime-order groups. Instead, it uses composite order groups where the order is $h\cdot q$ where $q$ is prime and $h = 8$ is the so-called cofactor. This actually creates subtle issues when batch-verifying Schnorr signatures, for example, where signatures that verify individually will not verify as part of a batch8.

Recommendation: If you have the freedom in your application, you should avoid implementing Schnorr over non-prime order groups (i.e., avoid Ed25519) and adopt Schnorr variants like Schnorrkel15 which use prime-order groups.

Conclusion

By now, you should be pretty well-versed in Schnorr signatures and a few of their properties: nonce reuse attacks, batch verification, alternative forms, etc. There is so much more to say about them. Perhaps this article will grow over time.

Questions left

  1. What other aspects of Schnorr signatures should this blog post address?
  2. The original Schnorr paper1 claims $\lambda$-bit hashes (as opposed to $2\lambda$) are sufficient for $\lambda$-bit security. I believe this analysis remains true?
  3. What is a good academic reference for the cleanest EUF-CMA security proof for (single-signer) Schnorr?
  4. What is the the earliest work that defines Schnorr signatures over elliptic curves?
  5. What is the significance of [PV05]16

  1. Efficient Identification and Signatures for Smart Cards, by Schnorr, C. P., in Advances in Cryptology — CRYPTO’ 89 Proceedings, 1990  2 3

  2. How To Prove Yourself: Practical Solutions to Identification and Signature Problems, by Fiat, Amos and Shamir, Adi, in Advances in Cryptology — CRYPTO’ 86, 1987 

  3. Not sure what the earliest work is that uses Schnorr signatures over, say, elliptic curves. 

  4. ECDSA verification, P2PKH uncompressed address  2

  5. How did pay-to-pubkey hash come about? What is its history? 

  6. Related key attacks in BIP-340 

  7. High-speed high-security signatures, by Bernstein, Daniel J. and Duif, Niels and Lange, Tanja and Schwabe, Peter and Yang, Bo-Yin, in Journal of Cryptographic Engineering, 2012, [URL]  2 3

  8. It’s 255:19AM. Do you know what your validation criteria are?, Henry de Valence  2 3 4

  9. Taming the many EdDSAs, by Konstantinos Chalkias and François Garillot and Valeria Nikolaenko, in Cryptology ePrint Archive, Report 2020/1244, 2020, [URL]  2

  10. The Provable Security of Ed25519: Theory and Practice, by Jacqueline Brendel and Cas Cremers and Dennis Jackson and Mang Zhao, in Cryptology ePrint Archive, Report 2020/823, 2020, [URL]  2

  11. An Explainer On Ed25519 Clamping, Jake Craige 

  12. Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies, by Joachim Breitner and Nadia Heninger, in Cryptology ePrint Archive, Paper 2019/023, 2019, [URL] 

  13. Bitcoin Transaction Malleability and MtGox, by Decker, Christian and Wattenhofer, Roger, in Computer Security - ESORICS 2014, 2014 

  14. https://ristretto.group 

  15. Schnorrkel 

  16. Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log, by Paillier, Pascal and Vergnaud, Damien, in Advances in Cryptology - ASIACRYPT 2005, 2005