A Closer Look at Multiple Forking: Leveraging (In)dependence for a - - PowerPoint PPT Presentation

a closer look at multiple forking leveraging in
SMART_READER_LITE
LIVE PREVIEW

A Closer Look at Multiple Forking: Leveraging (In)dependence for a - - PowerPoint PPT Presentation

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work A Closer Look at Multiple Forking: Leveraging (In)dependence for a Tighter Bound Sanjit Chatterjee and Chethan Kamath Indian Institute of Science, Bangalore


slide-1
SLIDE 1

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

A Closer Look at Multiple Forking: Leveraging (In)dependence for a Tighter Bound

Sanjit Chatterjee and Chethan Kamath

Indian Institute of Science, Bangalore

November 3, 2013

slide-2
SLIDE 2

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Table of contents

Background Schnorr Signature and Oracle Replay Attack General Forking Multiple Forking Galindo-Garcia IBS and Nested Replay Attack Multiple-Forking Lemma Improving on Multiple Forking Intuition: The GG-IBS Perspective Notion of (In)Dependency A Unified Treatment Conclusion and Future Work

slide-3
SLIDE 3

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

BACKGROUND

slide-4
SLIDE 4

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Schnorr Signature: Features

  • Derived from Schnorr identification through FS Transform
  • Uses one hash function
  • Security:
  • Based on the discrete-log assumption
  • Hash function modelled as a random oracle (RO)
  • Security argued using (random) oracle replay attacks
slide-5
SLIDE 5

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Schnorr Signature: Construction

The Setting:

  • 1. We work in group G = g of prime order p.
  • 2. A hash function H : {0, 1}∗ → Zp is used.

Key Generation:

  • 1. Select z ∈R Zp as the sk
  • 2. Set Z := g z as the pk

Signing:

  • 1. Select r ∈R Zp, set R := g r and c := H(m, R).
  • 2. The signature on m is σ := (y, R) where y := r + zc

Verification:

  • 1. Let σ = (y, R) and c = H(m, R).
  • 2. σ is valid if g y = RZ c
slide-6
SLIDE 6

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

The Oracle Replay Attack

  • Random oracle H – ith RO query Qi replied with si.

C

H

Π A Π Qi si Π

H

Adversary re-wound to QI Simulation in round 1 from QI using a different random function

QI+1 Qγ round 0 Q1 Q2 QI Q′

I+1

Q′

γ

round 1 s1 sI s′

I

sγ s′

γ

slide-7
SLIDE 7

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

The Oracle Replay Attack

  • Random oracle H – ith RO query Qi replied with si.

C

H

Π A Π Qi si Π

H

  • 1. Adversary re-wound to QI

Simulation in round 1 from QI using a different random function

QI+1 Qγ round 0 Q1 Q2 QI Q′

I+1

Q′

γ

round 1 s1 sI s′

I

sγ s′

γ

slide-8
SLIDE 8

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

The Oracle Replay Attack

  • Random oracle H – ith RO query Qi replied with si.

C

H

Π A Π Qi si Π

H

  • 1. Adversary re-wound to QI
  • 2. Simulation in round 1 from QI using a different random

function

QI+1 Qγ round 0 Q1 Q2 QI Q′

I+1

Q′

γ

round 1 s1 sI s′

I

sγ s′

γ

slide-9
SLIDE 9

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Security of Schnorr Signature, In Brief

B

DLP

C

DLP SS H

A

SS

∆ = (G, g, p, g α) α pk := ∆ EU-NMA ˆ σ = ((y, R); ˆ m)

QI+1 Qγ ˆ σ0 = ((y = r + αc, R); ˆ m) Q1 Q2 QI : H( ˆ m, R) Q′

I+1

Q′

γ

ˆ σ1 = ((y′ = r + αc′, R); ˆ m) c c′ round 0 round 1

α = y − y′ c − c′

slide-10
SLIDE 10

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Cost of Oracle Replay Attack

The Forking Lemma [PS00] gives a bound on the success probability of the oracle replay attack in terms of

  • 1. success probability of the adversary (ǫ)
  • 2. bound on RO queries (q)

DLP ≤O(q/ǫ2) Schnorr Signature

slide-11
SLIDE 11

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Cost of Oracle Replay Attack

The Forking Lemma [PS00] gives a bound on the success probability of the oracle replay attack in terms of

  • 1. success probability of the adversary (ǫ)
  • 2. bound on RO queries (q)

DLP ≤O(q/ǫ2) Schnorr Signature The cost: security degrades by O (q)

  • More or less optimal [Seu12]
slide-12
SLIDE 12

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

General Forking Lemma

“Forking Lemma is something purely probabilistic, not about signatures” [BN06]

  • Abstract version of the Forking Lemma
  • Separates out details of simulation (of adversary) from analysis
  • A wrapper algorithm used as intermediary
  • Simulate the protocol environment to A
  • Simulate the RO as specified by S
slide-13
SLIDE 13

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

General Forking Lemma

“Forking Lemma is something purely probabilistic, not about signatures” [BN06]

  • Abstract version of the Forking Lemma
  • Separates out details of simulation (of adversary) from analysis
  • A wrapper algorithm used as intermediary
  • Simulate the protocol environment to A
  • Simulate the RO as specified by S

S A

slide-14
SLIDE 14

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

General Forking Lemma

“Forking Lemma is something purely probabilistic, not about signatures” [BN06]

  • Abstract version of the Forking Lemma
  • Separates out details of simulation (of adversary) from analysis
  • A wrapper algorithm used as intermediary
  • Simulate the protocol environment to A
  • Simulate the RO as specified by S

S A S A W

  • Structure of a wrapper call:

(I, σ) ← W(x, s1, . . . , sq; ρ)

slide-15
SLIDE 15

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

...General Forking Lemma...

General-Forking Algorithm FW (x) Pick coins ρ for W at random {s1, . . . , sq} ∈R S; (I, σ) ← W(x, s1, . . . , sq; ρ) / /round 0 if (I = 0) then return (0, ⊥, ⊥) {s′

I0, . . . , s′ q} ∈R S; (I ′, σ′) ← W(x, s1, . . . , sI−1, s′ I , . . . , s′ q; ρ)

/ /round 1 if (I ′ = I ∧ s′

I = sI ) then return (1, σ, σ′)

else return (0, ⊥, ⊥)

slide-16
SLIDE 16

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

...General Forking Lemma...

General-Forking Algorithm FW (x) Pick coins ρ for W at random {s1, . . . , sq} ∈R S; (I, σ) ← W(x, s1, . . . , sq; ρ) / /round 0 if (I = 0) then return (0, ⊥, ⊥) {s′

I0, . . . , s′ q} ∈R S; (I ′, σ′) ← W(x, s1, . . . , sI−1, s′ I , . . . , s′ q; ρ)

/ /round 1 if (I ′ = I ∧ s′

I = sI ) then return (1, σ, σ′)

else return (0, ⊥, ⊥)

The General Forking Lemma gives a bound on the success probability of the oracle replay attack (frk) in terms of

  • 1. success probability of W (acc)
  • 2. bound on RO queries (q)

frk ≥ acc2/q

slide-17
SLIDE 17

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

MULTIPLE FORKING

slide-18
SLIDE 18

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Overview

  • Introduced by Boldyreva et al. [BPW12]
  • Motivation:
  • General Forking restricted to one RO and single replay attack
  • Multiple Forking considers two ROs and multiple replay attacks
slide-19
SLIDE 19

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Overview

  • Introduced by Boldyreva et al. [BPW12]
  • Motivation:
  • General Forking restricted to one RO and single replay attack
  • Multiple Forking considers two ROs and multiple replay attacks
  • Used originally to argue security of a DL-based proxy

signature scheme

  • Used further in
  • 1. Galindo-Garcia IBS [GG09]
  • 2. Chow et al. Zero-Knowledge Argument [CMW12]
slide-20
SLIDE 20

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

GALINDO-GARCIA IBS

slide-21
SLIDE 21

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Galindo-Garcia IBS: Features

  • Derived from Schnorr signature scheme – nesting
  • Based on the discrete-log (DL) assumption
  • Efficient, simple and does not use pairing
  • Uses two hash functions
  • Security argued using nested replay attacks
slide-22
SLIDE 22

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Galindo-Garcia IBS: Construction

Setting:

  • 1. We work in a group G = g of prime order p.
  • 2. Two hash functions H, G : {0, 1}∗ → Zp are used.

Set-up:

  • 1. Select z ∈R Zp as the msk; set Z := g z as the mpk

Key Extraction:

  • 1. Select r ∈R Zp and set R := g r.
  • 2. Return usk := (y, R) as the usk, where y := r + zc and

c := H(id, R).

Signing:

  • 1. Select a ∈R Zp and set A := g a.
  • 2. Return σ := (b, R, A) as the signature, where b := a + yd

and d := G(id, m, A).

slide-23
SLIDE 23

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Security, In Brief/The Nested Replay Attack

B

DLP

C

DLP GG H,G

A

GG

∆ = (G, g, p, g α) α mpk := ∆ EU-ID-CMA

ˆ σ = ((ˆ b, ˆ R, ˆ A); ( ˆ id, ˆ m)) Q0

I0+1

Q0

q

ˆ σ0 = (ˆ b0, ˆ R, ˆ A0) Q0

J0+1

Q0

I0 : G( ˆ

id, ˆ m0, ˆ A0) Q1

I0+1

Q1

q

ˆ σ1 = (ˆ b1, ˆ R, ˆ A0) Q0

1

Q0

2

Q0

J0 : H( ˆ

id, ˆ R) QI1+1

2

Q2

q

ˆ σ2 = (ˆ b2, ˆ R, ˆ A2) Q2

J0+1

Q2

I0 : G( ˆ

id, ˆ m2, ˆ A2) Q3

I1+1

Q3

q

ˆ σ3 = (ˆ b3, ˆ R, ˆ A2) c0 c1 d0 d1 round 0 round 1 d2 d3 round 2 round 3

α = (ˆ b0 − ˆ b1)(d2 − d3) − (ˆ b2 − ˆ b3)(d0 − d1) (c0 − c1)(d0 − d1)(d2 − d3)

slide-24
SLIDE 24

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Extending General Forking: Multiple-Forking

Multiple-Forking Algorithm MW ,3 Pick coins ρ for W at random {s0

1, . . . , s0 q} ∈R S;

(I0, J0, σ0) ← W (x, s0

1, . . . , s0 q; ρ)

/ /round 0 if ((I0 = 0) ∨ (J0 = 0)) then return (0, ⊥) {s1

I0, . . . , s1 q} ∈R S;

(I1, J1, σ1) ← W (x, s0

1, . . . , s0 I0−1, s1 I0, . . . , s1 q; ρ)

/ /round 1 if

  • (I1, J1) = (I0, J0) ∨ (s1

I0 = s0 I0)

  • then return (0, ⊥)

{s2

J0, . . . , s2 q} ∈R S;

(I2, J2, σ2) ← W (x, s0

1, . . . , s0 J0−1, s2 J0, . . . , s2 q; ρ)

/ /round 2 if

  • (I2, J2) = (I0, J0) ∨ (s2

J0 = s1 J0)

  • then return (0, ⊥)

{s3

I2, . . . , s3 q} ∈R S;

(I3, J3, σ3) ← W (x, s0

1, . . . , s0 J0−1, s2 J0, . . . , s2 I2−1, s3 I2, . . . , s3 q; ρ)

/ /round 3 if

  • (I3, J3) = (I0, J0) ∨ (s3

I0 = s2 I0)

  • then return (0, ⊥)

return (1, {σ0, . . . , σ3})

slide-25
SLIDE 25

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Multiple-Forking Lemma

The Multiple-Forking Lemma gives a bound on the success probability of the nested replay attack (mfrk) in terms of

  • 1. success probability of W (acc)
  • 2. bound on RO queries (q)
  • 3. number of rounds of forking (n)

mfrk ≥ accn+1/q2n Follows from condition: F : (In, Jn) = (In−1, Jn−1) = . . . = (I0, J0) Degradation: O

  • q2n
slide-26
SLIDE 26

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Multiple-Forking Lemma

The Multiple-Forking Lemma gives a bound on the success probability of the nested replay attack (mfrk) in terms of

  • 1. success probability of W (acc)
  • 2. bound on RO queries (q)
  • 3. number of rounds of forking (n)

mfrk ≥ accn+1/q2n Follows from condition: F : (In, Jn) = (In−1, Jn−1) = . . . = (I0, J0) Degradation: O

  • q2n
  • Can we improve?
slide-27
SLIDE 27

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

IMPROVING ON MULTIPLE FORKING

slide-28
SLIDE 28

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

The Intuition

  • Recall, condition F : (I3, J3) = (I2, J2) = (I1, J1) = (I0, J0)

Q0

I0+1

Q0

q

round 0 Q0

J0+1

Q0

I0 : G( ˆ

id, ˆ m0, ˆ A0) Q1

I0+1

Q1

q

round 1 Q0

1

Q0

2

Q0

J0 : H( ˆ

id, ˆ R) QI1+1

2

Q2

q

round 2 Q2

J0+1

Q2

I0 : G( ˆ

id, ˆ m2, ˆ A2) Q3

I1+1

Q3

q

round 3

slide-29
SLIDE 29

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

The Intuition

  • Recall, condition F : (I3, J3) = (I2, J2) = (I1, J1) = (I0, J0)

Q0

I0+1

Q0

q

round 0 Q0

J0+1

Q0

I0 : G( ˆ

id, ˆ m0, ˆ A0) Q1

I0+1

Q1

q

round 1 Q0

1

Q0

2

Q0

J0 : H( ˆ

id, ˆ R) QI1+1

2

Q2

q

round 2 Q2

J0+1

Q2

I0 : G( ˆ

id, ˆ m0, ˆ A2) Q3

I1+1

Q3

q

round 3

  • Observations:
  • 1. Independency condition O1: I2 need not equal I0
slide-30
SLIDE 30

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

The Intuition

  • Recall, condition F : (I3, J3) = (I2, J2) = (I1, J1) = (I0, J0)

Q0

I0+1

Q0

q

round 0 Q0

J0+1

Q0

I0 : G( ˆ

id, ˆ m0, ˆ A0) Q1

I0+1

Q1

q

round 1 Q0

1

Q0

2

Q0

J0 : H( ˆ

id, ˆ R) QI1+1

2

Q2

q

round 2 Q2

J0+1

Q2

I0 : G( ˆ

id, ˆ m2, ˆ A2) Q3

I1+1

Q3

q

round 3

  • Observations:
  • 1. Independency condition O1: I2 need not equal I0
  • 2. Dependency condition O2: (I1 = I0) can imply (J1 = J0)
slide-31
SLIDE 31

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

The Intuition

  • Recall, condition F : (I3, J3) = (I2, J2) = (I1, J1) = (I0, J0)

Q0

I0+1

Q0

q

round 0 Q0

J0+1

Q0

I0 : G( ˆ

id, ˆ m0, ˆ A0) Q1

I0+1

Q1

q

round 1 Q0

1

Q0

2

Q0

J0 : H( ˆ

id, ˆ R) QI1+1

2

Q2

q

round 2 Q2

J0+1

Q2

I0 : G( ˆ

id, ˆ m2, ˆ A2) Q3

I1+1

Q3

q

round 3

  • Observations:
  • 1. Independency condition O1: I2 need not equal I0
  • 2. Dependency condition O2: (I1 = I0) can imply (J1 = J0)

(similarly (I3 = I2) can imply (J3 = J2))

slide-32
SLIDE 32

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

...The Intuition...

Effect of O1 and O2 on F : (I3, J3) = (I2, J2) = (I1, J1) = (I0, J0)

  • O1: I2 need not equal I0

(I3, J3) = (I2, J2) ∧ (J2 = J0) ∧ (I1, J1) = (I0, J0)

  • O2: (I1 = I0) =

⇒ (J1 = J0) and (I3 = I2) = ⇒ (J3 = J2) (I3 = I2 = I1 = I0) ∧ (J2 = J0)

slide-33
SLIDE 33

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

...The Intuition...

Effect of O1 and O2 on F : (I3, J3) = (I2, J2) = (I1, J1) = (I0, J0)

  • O1: I2 need not equal I0

(I3, J3) = (I2, J2) ∧ (J2 = J0) ∧ (I1, J1) = (I0, J0)

  • O2: (I1 = I0) =

⇒ (J1 = J0) and (I3 = I2) = ⇒ (J3 = J2) (I3 = I2 = I1 = I0) ∧ (J2 = J0)

  • Together, O1&O2:

(I3 = I2) ∧ (I1 = I0) ∧ (J2 = J0)

slide-34
SLIDE 34

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

...The Intuition...

Effect of O1 and O2 on F : (I3, J3) = (I2, J2) = (I1, J1) = (I0, J0)

  • O1: I2 need not equal I0

(I3, J3) = (I2, J2) ∧ (J2 = J0) ∧ (I1, J1) = (I0, J0)

  • O2: (I1 = I0) =

⇒ (J1 = J0) and (I3 = I2) = ⇒ (J3 = J2) (I3 = I2 = I1 = I0) ∧ (J2 = J0)

  • Together, O1&O2:

(I3 = I2) ∧ (I1 = I0) ∧ (J2 = J0) Intuitively, degradation reduced to O

  • q3
  • In general, degradation reduced to O (qn)
slide-35
SLIDE 35

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

MORE ON (IN)DEPENDENCY

slide-36
SLIDE 36

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

The Conceptual Wrapper

  • Observations better formulated using a conceptual wrapper
  • Clubs two (consecutive) executions of the original wrapper
  • Denoted by Z

(Ik, Jk, σk), (Ik+1, Jk+1, σk+1)) ← Z

  • x, Sk, Sk+1; ρ
  • Q0

I0+1

Q0

q

round 0 Q0

J0+1

Q0

I0

Q1

I0+1

Q1

q

round 1 Q0

1

Q0

2

Q0

J0

QI1+1

2

Q2

q

round 2 Q2

J0+1

Q2

I0

Q3

I1+1

Q3

q

round 3

slide-37
SLIDE 37

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

The Conceptual Wrapper

  • Observations better formulated using a conceptual wrapper
  • Clubs two (consecutive) executions of the original wrapper
  • Denoted by Z

(Ik, Jk, σk), (Ik+1, Jk+1, σk+1)) ← Z

  • x, Sk, Sk+1; ρ
  • Q0

I0+1

Q0

q

round 0 Q0

J0+1

Q0

I0

Q1

I0+1

Q1

q

round 1 Q0

1

Q0

2

Q0

J0

QI1+1

2

Q2

q

round 2 Q2

J0+1

Q2

I0

Q3

I1+1

Q3

q

round 3

slide-38
SLIDE 38

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Index Independency

Q0

I0+1

Q0

q

round 0 Q0

J0+1

Q0

I0

Q1

I0+1

Q1

q

round 1 Q0

1

Q0

2

Q0

J0

QI1+1

2

Q2

q

round 2 Q2

J0+1

Q2

I0

Q3

I1+1

Q3

q

round 3

  • It is not necessary for the I indices across Z to be the same
  • Ik need not be equal to Ik−2, Ik−4, . . . , I0 for k = 2, 4, . . . , n − 1
slide-39
SLIDE 39

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Random-Oracle Dependency

Q0

I0+1

Q0

q

round 0 Q0

J0+1

Q0

I0

Q1

I0+1

Q1

q

round 1 Q0

1

Q0

2

Q0

J0

QI1+1

2

Q2

q

round 2 Q2

J0+1

Q2

I0

Q3

I1+1

Q3

q

round 3

  • It is possible to design protocols such that, for the kth

invocation of Z, (Ik+1 = Ik) = ⇒ (Jk+1 = Jk).

slide-40
SLIDE 40

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Inducing Random-Oracle Dependency

  • Consider round 0 and round 1 of simulation for GG-IBS

Q0

I0+1

round 0 · Q0

J0 : H( ˆ

id, ˆ R) Q0

I0 : G( ˆ

id, ˆ m0, ˆ A0) Q1

I0+1

round 1 c0 d0 d1

slide-41
SLIDE 41

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Inducing Random-Oracle Dependency

  • Consider round 0 and round 1 of simulation for GG-IBS

Q0

I0+1

round 0 · Q0

J0 : H( ˆ

id, ˆ R) Q0

I0 : G( ˆ

id, ˆ m0, ˆ A0) Q1

I0+1

round 1 c0 d0 d1

  • Need to explicitly ensure that (J1 = J0)
slide-42
SLIDE 42

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Inducing Random-Oracle Dependency

  • Consider round 0 and round 1 of simulation for GG-IBS

Q0

I0+1

round 0 · Q0

J0 : H( ˆ

id, ˆ R) Q0

I0 : G( ˆ

id, ˆ m0, ˆ A0) Q1

I0+1

round 1 c0 d0 d1

  • Need to explicitly ensure that (J1 = J0)

Q0

I0+1

round 0 · Q0

J0 : H( ˆ

id, ˆ R) Q0

I0 : G( ˆ

id, ˆ m0, ˆ A0, c0) Q1

I0+1

round 1 c0 d0 d1

slide-43
SLIDE 43

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Inducing Random-Oracle Dependency

  • Consider round 0 and round 1 of simulation for GG-IBS

Q0

I0+1

round 0 · Q0

J0 : H( ˆ

id, ˆ R) Q0

I0 : G( ˆ

id, ˆ m0, ˆ A0) Q1

I0+1

round 1 c0 d0 d1

  • Need to explicitly ensure that (J1 = J0)

Q0

I0+1

round 0 · Q0

J0 : H( ˆ

id, ˆ R) Q0

I0 : G( ˆ

id, ˆ m0, ˆ A0, c0) Q1

I0+1

round 1 c0 d0 d1

  • Hence, (I1 = I0) =

⇒ (J1 = J0)!

slide-44
SLIDE 44

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Galindo-Garcia IBS with Binding

Setting:

  • 1. We work in a group G = g of prime order p.
  • 2. Two hash functions H, G : {0, 1}∗ → Zp are used.

Set-up:

  • 1. Select z ∈R Zp as the msk; set Z := g z as the mpk

Key Extraction:

  • 1. Select r ∈R Zp and set R := g r.
  • 2. Return usk := (y, R) as the usk, where y := r + zc and

c := H(id, R).

Signing:

  • 1. Select a ∈R Zp and set A := g a.
  • 2. Return σ := (b, R, A) as the signature, where b := a + yd

and d := G(m, A, c).

slide-45
SLIDE 45

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

...Random Oracle Dependency...

Definition (Random-Oracle Dependency)

A random oracle H2 is defined to be η-dependent on the random

  • racle H1 (H1 ≺ H2) if the following criteria are satisfied:
  • 1. (1 ≤ J < I ≤ q) and
  • 2. Pr[(J′ = J) | (I ′ = I)] ≤ η
slide-46
SLIDE 46

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

...Random Oracle Dependency...

Definition (Random-Oracle Dependency)

A random oracle H2 is defined to be η-dependent on the random

  • racle H1 (H1 ≺ H2) if the following criteria are satisfied:
  • 1. (1 ≤ J < I ≤ q) and
  • 2. Pr[(J′ = J) | (I ′ = I)] ≤ η

Claim (Binding induces dependency)

Binding H2 to H1 induces a random-oracle dependency H1 ≺ H2 with ηb := q1(q1 − 1)/|R1|.

  • Here q1 denotes the upper bound on the number of queries to

the random oracle H1; R1 denotes the range of H1.

slide-47
SLIDE 47

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

A UNIFIED TREATMENT

slide-48
SLIDE 48

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

A Unified Model

  • Depending on whether O1 and O2 is applicable, we get four

different MF Algorithms and MF Lemmas

  • To incorporate this, we add additional abstraction to the MF

Algorithm

  • The condition itself is passed as a parameter
slide-49
SLIDE 49

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

General Multiple-Forking Lemma

MF Set of Conditions Degradation Original A0 =      B : (I0 ≥ 1) ∧ (J0 ≥ 1) Ck : (Ik+1, Jk+1) = (Ik, Jk)∧(sk+1

Ik

= sk

Ik )

Dk : (Ik, Jk) = (I0, J0) ∧ (sk

J0 = sl J0)

O

  • q2n

with O1 A1 =      B : (I0 ≥ 1) ∧ (J0 ≥ 1) Ck : (Ik+1, Jk+1) = (Ik, Jk)∧(sk+1

Ik

= sk

Ik )

Dk : (Jk = J0) ∧ (Ik ≥ 1) ∧ (sk

J0 = sl J0)

O

  • q(3n+1)/2

with O2 A2 =      B : (1 ≤ J0 < I0 ≤ q) Ck : (Ik+1 = Ik)∧(sk+1

Ik

= sk

Ik )

Dk : (Ik, Jk) = (I0, J0)∧(sk

J0 = sl J0)

O

  • q(3n−1)/2

with O1&O2 A3 =      B : (1 ≤ J0 < I0 ≤ q) Ck : (Ik+1 = Ik)∧(sk+1

Ik

= sk

Ik )

Dk : (Jk = J0)∧(Jk < Ik ≤ q) ∧ (sk

J0 = sl J0)

O (qn)

  • Condition F : ∧k=0,2,...,n−1Ck ∧ Dk
slide-50
SLIDE 50

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

General Multiple-Forking Algorithm

NA,W ,n Pick coins ρ for W at random {s0

1, . . . , s0 q} ∈R S;

(I0, J0, σ0) ← W (x, s0

1, . . . , s0 q; ρ)

/ /round 0 {s1

I0, . . . , s1 q} ∈R S;

(I1, J1, σ1) ← W (x, s0

1, . . . , s0 I0−1, s1 I0, . . . , s1 q; ρ)

/ /round 1 if ¬(B∧C0) then return (0, ⊥) k := 2 while (k < n) do {sk

J0, . . . , sk q } ∈R S;

(Ik, Jk, σk) ← W (x, s0

1, . . . , s0 J0−1, sk J0, . . . , sk q ; ρ)

/ /round k {sk+1

Ik

, . . . , sk+1

q

} ∈R S; (Ik+1, Jk+1, σk+1) ← W (x, s0

1, . . . , s0 J0−1, sk J0, . . . , sk Ik −1, sk+1 Ik

, . . . , sk+1

q

; ρ) / /round k+1 if ¬(Ck ∧ Dk) then return (0, ⊥) k := k + 2 end while return (1, {σ0, . . . , σn})

slide-51
SLIDE 51

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

CONCLUSION AND FUTURE WORK

slide-52
SLIDE 52

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Conclusion and Future Work

Conclusions:

  • Identified the source of degradation for multiple forking and

gave a tighter bound

  • A unified model for multiple forking

Future directions:

  • Is the bound optimal?
  • Other applications for RO dependency?
  • Γ-protocols [YZ13]
  • Extended Forking Lemma [YADV+12]
  • Other techniques to induces RO dependency
slide-53
SLIDE 53

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

THANK YOU!

slide-54
SLIDE 54

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Bibliography

BN06 Mihir Bellare and Gregory Neven. Multi-signatures in the plain public-key model and a general forking lemma – CCS’06 BPW12 Alexandra Boldyreva, Adriana Palacio, and Bogdan Warinschi. Secure proxy signature schemes for delegation of signing rights – JoC, 25 CMW12 Sherman Chow, Changshe Ma, and Jian Weng. Zero-knowledge argument for simultaneous discrete logarithms – Algorithmica, 64(2) GG09 David Galindo and Flavio Garcia. A Schnorr-like lightweight identity-based signature scheme – AFRICACRYPT’09. PS00 David Pointcheval and Jacques Stern. Security arguments for digital signatures and blind signatures – JoC, 13

slide-55
SLIDE 55

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

...Bibliography...

Seu12 Yannick Seurin. On the exact security of Schnorr-type signatures in the random oracle model – EUROCRYPT’12 YADV+ Sidi-Mohamed Yousfi-Alaoui, ¨ Ozg¨ ur Dagdelen, Pascal V´ eron, David Galindo and Pierre-Louis Cayrel. Extended Security Arguments for Signature Schemes – AFRICACRYPT’12 YZ13 Andrew Chi-Chih Yao and Yunlei Zhao. Online/offline signatures for low-power devices – IEEE Transactions on Information Forensics and Security, 8(2)

slide-56
SLIDE 56

Background Multiple Forking Improving on Multiple Forking Conclusion and Future Work

Further Reading

CKK12 Sanjit Chatterjee, Chethan Kamath, and Vikas Kumar. Galindo-Garcia identity-based signature revisited – ICISC’12 CK13 Sanjit Chatterjee and Chethan Kamath. A Closer Look at Multiple-Forking: Leveraging (In)dependence for a Tighter Bound – IACR eprint archive, 2013/651