Another Look At Some Isogeny Hardness Assumptions Simon-Phillipp - - PowerPoint PPT Presentation

another look at some isogeny hardness assumptions
SMART_READER_LITE
LIVE PREVIEW

Another Look At Some Isogeny Hardness Assumptions Simon-Phillipp - - PowerPoint PPT Presentation

Another Look At Some Isogeny Hardness Assumptions Simon-Phillipp Merz, Romy Minko, Christophe Petit ECC 2019 3 December 1 / 50 Motivation Isogeny based cryptography Another Look at Provable Security Neal Koblitz Dept. of


slide-1
SLIDE 1

Another Look At Some Isogeny Hardness Assumptions

Simon-Phillipp Merz, Romy Minko, Christophe Petit

ECC 2019 3 December

1 / 50

slide-2
SLIDE 2

Motivation

Another Look at “Provable Security”

Neal Koblitz

  • Dept. of Mathematics, Box 354350
  • Univ. of Washington, Seattle, WA 98195 U.S.A.

koblitz@math.washington.edu

Alfred J. Menezes

  • Dept. of Combinatorics & Optimization
  • Univ. of Waterloo, Waterloo, Ontario N2L 3G1 Canada

ajmeneze@uwaterloo.ca

July 4, 2004∗

Abstract We give an informal analysis and critique of several typical “provable security” results. In some cases there are intuitive but convincing argu- ments for rejecting the conclusions suggested by the formal terminology and “proofs,” whereas in other cases the formalism seems to be consistent with common sense. We discuss the reasons why the search for mathemat- ically convincing theoretical evidence to support the security of public-key systems has been an important theme of researchers. But we argue that the theorem-proof paradigm of theoretical mathematics is often of limited relevance here and frequently leads to papers that are confusing and mis-

  • leading. Because our paper is aimed at the general mathematical public,

it is self-contained and as jargon-free as possible. Key words. Cryptography, Public Key, Provable Security AMS subject classifications. 94A60, 68P25, 11T71

1 Introduction

Suppose that someone is using public-key cryptography to protect credit card numbers during online purchases, maintain confidentiality of medical records, or safeguard national security information. How can she be sure that the system is secure? What type of evidence could convince her that a malicious adversary could not somehow break into the system and learn her secret? At first glance it seems that this question has a straightforward answer. At the heart of any public-key cryptosystem is a “one-way function” — a function

§updated on July 16, 2004; October 25, 2004; March 31, 2005; and May 4, 2005

1

◮ Isogeny based cryptography is becoming more popular. ◮ More protocols are developed, and sometimes their security does not reduce to existing problems. ◮ New ‘hard’ problems are therefore proposed.

2 / 50

slide-3
SLIDE 3

Outline

◮ (Very Brief) Introduction ◮ Reviewing Some Isogeny Problems ◮ Undeniable Signature Schemes

◮ Jao-Soukharev (2014) ◮ Srinath-Chandrasekaran (2018)

◮ Attack on the Computational Hardness Assumption ◮ Attack on the Signature Scheme

3 / 50

slide-4
SLIDE 4

SIDH Protocol

Parameters

◮ ℓA, ℓB small distinct primes ◮ eA, eB positive integers ◮ p = ℓeA

A ℓeB B f ± 1 , p prime

Fix a supersingular elliptic curve E defined over Fp2 and bases {PA, QA}, {PB, QB} of the ℓeA

A and ℓeB B torsions of E, respectively.

Alice chooses 0 < mA, nA < ℓeA

A . Bob chooses 0 < mB, nB < ℓeB B .

4 / 50

slide-5
SLIDE 5

SIDH Protocol

Alice publishes EA, φA(PB), φA(QB). Bob publishes EB, φB(PA), φB(QA). EA = E/[mA]PA + [nA]QA E EAB EB = E/[mB]PB + [nB]QB

φ′

B

φA φB φ′

A 5 / 50

slide-6
SLIDE 6

Outline

◮ (Very Brief) Introduction ◮ Reviewing Some Isogeny Problems ◮ Undeniable Signature Schemes

◮ Jao-Soukharev (2014) ◮ Srinath-Chandrasekaran (2018)

◮ Attack on the Computational Hardness Assumption ◮ Attack on the Signature Scheme

6 / 50

slide-7
SLIDE 7

Problem Statements

Supersingular Isogeny Computational Diffie-Hellman

Problem (SSCDH)

Given the curves E, EA, EB and the points φA(PB), φA(QB), φB(PA) and φB(QA), find the j-invariant of EAB = E/[mA]PA + [nA]QA, [mB]PB + [nB]QB.

7 / 50

slide-8
SLIDE 8

Problem Statements

Modified SSCDH

Problem (Modified SSCDH)

Given E, EA, EB and ker(φB), determine EAB up to isomorphism, i.e. find j(EAB).

8 / 50

slide-9
SLIDE 9

Problem Statements

One-Sided Modified SSCDH

Signing Oracle

For fixed curves E, EA, EB, let OB be an oracle that solves MSSCDH for EA, EB′, ker(φB′) such that EB′ is ◮ not isomorphic to EB, and ◮ ℓeB

B -isogenous to E.

Problem (One-Sided MSSCDH)

For fixed E, EA, EB, given OB, solve MSSCDH for EA, EB and ker(φB).

9 / 50

slide-10
SLIDE 10

One-Sided Modified SSCDH

E EA EB EB′ EAB EAB′

φB′ φB φA φ′

B

φ′

B′

φ′

A

φ′′

A

Target Curve Oracle Output

10 / 50

slide-11
SLIDE 11

Problem Statements

One-More Modified SSCDH

Signing Oracle

For fixed curves E, EA let OA be an oracle that solves MSSCDH for EA, EBi, ker(φBi) upon input of EBi, ℓeB

B -isogenous to E.

Problem (One-More MSSCDH)

After making q queries to OA produce at least q + 1 distinct pairs

  • f curves (EBi, EABi), where EABi is the solution to MSSCDH for

EA, EBi and ker(φBi), and EBi are ℓeB

B -isogenous to E for

1 ≤ i ≤ q + 1.

11 / 50

slide-12
SLIDE 12

Outline

◮ (Very Brief) Introduction ◮ Reviewing Some Isogeny Problems ◮ Undeniable Signature Schemes

◮ Jao-Soukharev (2014) ◮ Srinath-Chandrasekaran (2018)

◮ Attack on the Computational Hardness Assumption ◮ Attack on the Signature Scheme

12 / 50

slide-13
SLIDE 13

Undeniable Signature Schemes

◮ Σ = {KeyGen, Sign, Check, Sim, πcon, πdis}.

◮ KeyGen generates (vk, sk), a verification and signing key-pair. ◮ Sign(sk, m) = σm. ◮ Check((vk, m, σ), sk) determines if σ is valid. ◮ Sim(vk, m) simulates a signature for m. ◮ πcon, πdis are zero-knowledge interactive protocols.

13 / 50

slide-14
SLIDE 14

Jao-Soukharev (2014)

◮ Let p be a prime of the form ℓeA

A ℓeB B ℓeC C · f ± 1.

◮ Fix a supersingular curve E over Fp2, ◮ Fix bases {Pi, Qi} of the ℓei

i torsion of E for i ∈ {A, B, C}.

◮ Let H : {0, 1}∗ → Z be a cryptographic hash function.

14 / 50

slide-15
SLIDE 15

Jao-Soukharev (2014)

◮ Public Parameters: p, E, H, {Pi, Qi}i∈{A,B,C}. ◮ Signer’s Secret Key: mA, nA ∈ Z/ℓeA

A Z

(or φA : E → EA = E/[mA]PA + [nA]QA). ◮ Public Key: EA, φA(PC), φA(QC)

15 / 50

slide-16
SLIDE 16

Jao-Soukharev (2014)

Signing

For message M: ◮ Compute EB = E/PB + [H(M)]QB. E EA EB EAB

φA φB φAB φBA

◮ Output σ = (EAB, φBA(φB(PC)), φBA(φB(QC))).

16 / 50

slide-17
SLIDE 17

Jao-Soukharev (2014)

Confirmation/Disavowal

◮ The signer secretly chooses mC, nC ∈ Z/ℓCZ and computes SC = [mC]PC + [nC]QC.

EC EAC EBC EABC ϕCA ϕCB ϕACB ϕBCA

EC = E/⟨SC⟩, EBC = EB/⟨ϕB(SC)⟩ EAC = EA/⟨ϕA(SC)⟩, EABC = EBC/⟨ϕCB([mA]PA + [nA]QA)⟩

17 / 50

slide-18
SLIDE 18

Jao-Soukharev (2014)

Confirmation/Disavowal

◮ Given σ = {Eσ, Pσ, Qσ}, EσC = Eσ/[mc]Pσ + [nC]Qσ

Signer Verifier Commit: com = EC , EBC , EAC , EABC , ker(φCB) com b ←$ {0, 1} b if b = 0, X = ker(φC ). if b = 1, X = ker(φCA). X Check EσC = EABC .

18 / 50

slide-19
SLIDE 19

Jao-Soukharev (2014)

Confirmation/Disavowal

◮ Given σ = {Eσ, Pσ, Qσ}, EσC = Eσ/[mc]Pσ + [nC]Qσ

19 / 50

slide-20
SLIDE 20

Srinath-Chandrasekaran (2018)

Undeniable Blind Signatures

E EA EB EAB EBD EBDA

φA φB φBD φBDA ˆ φABD

Figure: Signing (with blindness)

E EA EB EAB

φA φB φAB φBA

Figure: Verification requires that the signature curve is in the isomorphism class of EAB.

20 / 50

slide-21
SLIDE 21

Undeniable Signature Schemes

◮ Security Properties:

◮ Undeniability ◮ Unforgeability ◮ Invisibility

21 / 50

slide-22
SLIDE 22

Undeniable Signature Schemes

Security Properties

Unforgeability ◮ The attacker has access to a signing oracle O. ◮ They can query the oracle polynomially many times with arbitrarily chosen messages mi. ◮ They must output valid (m, σ), where m = mi.

22 / 50

slide-23
SLIDE 23

Undeniable Signature Schemes

Security Properties

Invisibility ◮ The attacker has access to a signing oracle O. ◮ They can query the oracle polynomially many times with arbitrarily chosen messages mi. ◮ They then send mj = mi to a challenger. ◮ The challenger returns σc, either a simulated signature or a valid signature for mj. ◮ The attacker must decide if σc is valid.

23 / 50

slide-24
SLIDE 24

Security Proofs

Jao-Soukharev

Proof of Unforgeability and Invisibility [1]

Given zero-knowledge confirmation and disavowal protocols, forging signatures is equivalent to OMSSCDH. Invisibility requires that after a polynomial number of queries to the signing oracle, an adversary cannot determine the validity of a

  • signature. This problem is equivalent to OMSSCDH.

[1] David Jao and Vladimir Soukharev. Isogeny-based quantum-resistant undeniablesignatures. InInternational Workshop on Post-Quantum Cryptography, pages 160–179. Springer, 2014. 24 / 50

slide-25
SLIDE 25

Outline

◮ (Very Brief) Introduction ◮ Reviewing Some Isogeny Problems ◮ Undeniable Signature Schemes

◮ Jao-Soukharev (2014) ◮ Srinath-Chandrasekaran (2018)

◮ Attack on the Computational Hardness Assumption ◮ Attack on the Signature Scheme

25 / 50

slide-26
SLIDE 26

An attack against OMSSCDH Problem (OMSSCDH)

For fixed E, EA, EB, given an oracle, O, to solve MSSCDH for EA, EB′, ker(φB′) with EB′ not isomorphic to EB and ℓeB

B -isogenous to

E, solve MSSCDH for EA, EB and ker(φB). E EA EB EB′ EAB EAB′

φB′ φB φA φ′

B

φ′

B′

φ′

A

φ′′

A 26 / 50

slide-27
SLIDE 27

An attack against OMSSCDH Theorem

A solution to the OMSSCDH problem can be guessed with probability

1 (ℓB+1)ℓB after a single query to the signing oracle.

27 / 50

slide-28
SLIDE 28

An attack against OMSSCDH

Suppose we want to solve OMSSCDH given E, EA, EB and ker(φB). E

  • EB
  • EA
  • EAB
  • 28 / 50
slide-29
SLIDE 29

An attack against OMSSCDH

Suppose we want to solve OMSSCDH given E, EA, EB and ker(φB). ◮ Take EB1, EB2, ℓB-isogenous to EB.

29 / 50

slide-30
SLIDE 30

An attack against OMSSCDH

Suppose we want to solve OMSSCDH given E, EA, EB and ker(φB). ◮ Take EB1, EB2, ℓB-isogenous to EB. ◮ Query O with EB1 and EB2, to get EAB1 and EAB2.

29 / 50

slide-31
SLIDE 31

An attack against OMSSCDH

Suppose we want to solve OMSSCDH given E, EA, EB and ker(φB). ◮ Take EB1, EB2, ℓB-isogenous to EB. ◮ Query O with EB1 and EB2, to get EAB1 and EAB2. ◮ List the ℓB + 1 isomorphism classes of EAB1 and EAB2, ℓB-isogenous to EAB.

29 / 50

slide-32
SLIDE 32

An attack against OMSSCDH

Suppose we want to solve OMSSCDH given E, EA, EB and ker(φB). ◮ Take EB1, EB2, ℓB-isogenous to EB. ◮ Query O with EB1 and EB2, to get EAB1 and EAB2. ◮ List the ℓB + 1 isomorphism classes of EAB1 and EAB2, ℓB-isogenous to EAB. ◮ The intersection of these lists is the isomorphism class of EAB.

29 / 50

slide-33
SLIDE 33

An attack against OMSSCDH

E

  • EB

EB′ EA

  • EAB

EAB′ Querying O with EB′ close to EB yields a curve close to EAB, the target.

30 / 50

slide-34
SLIDE 34

An attack against OMSSCDH

We can do better. ◮ Use ker(φB) to find EB′, ℓ2

B-isogenous to EB and

ℓeB

B -isogenous to E.

31 / 50

slide-35
SLIDE 35

An attack against OMSSCDH

We can do better. ◮ Use ker(φB) to find EB′, ℓ2

B-isogenous to EB and

ℓeB

B -isogenous to E.

◮ Submit EB′ to O to receive EAB′.

31 / 50

slide-36
SLIDE 36

An attack against OMSSCDH

We can do better. ◮ Use ker(φB) to find EB′, ℓ2

B-isogenous to EB and

ℓeB

B -isogenous to E.

◮ Submit EB′ to O to receive EAB′. ◮ Guess the isomorphism class of EAB with success probability

  • f

1 (ℓB+1)ℓB .

31 / 50

slide-37
SLIDE 37

An attack against OMSSCDH

We can do better. ◮ Use ker(φB) to find EB′, ℓ2

B-isogenous to EB and

ℓeB

B -isogenous to E.

◮ Submit EB′ to O to receive EAB′. ◮ Guess the isomorphism class of EAB with success probability

  • f

1 (ℓB+1)ℓB .

This only uses one query to the oracle.

31 / 50

slide-38
SLIDE 38

An attack against 1MSSCDH Problem (One-More MSSCDH)

After making q queries to O produce at least q + 1 distinct pairs

  • f curves (EBi, EABi), where EABi is the solution to MSSCDH for

EA, EBi and ker(φBi), EBi are ℓeB

B -isogenous to E and EABi is

isomorphic to EAB for 1 ≤ i ≤ q + 1.

32 / 50

slide-39
SLIDE 39

An attack against 1MSSCDH Theorem

A solution to the 1MSSCDH problem can be guessed with probability

1 (ℓB+1)ℓB after a single query to the signing oracle.

33 / 50

slide-40
SLIDE 40

Outline

◮ (Very Brief) Introduction ◮ Reviewing Some Isogeny Problems ◮ Undeniable Signature Schemes

◮ Jao-Soukharev (2014) ◮ Srinath-Chandrasekaran (2018)

◮ Attack on the Computational Hardness Assumption ◮ Attack on the Signature Scheme

34 / 50

slide-41
SLIDE 41

Security Proofs

Jao-Soukharev

Proof of Unforgeability and Invisibility [1]

Given zero-knowledge confirmation and disavowal protocols, forging signatures is equivalent to OMSSCDH. Invisibility requires that after a polynomial number of queries to the signing oracle, an adversary cannot determine the validity of a

  • signature. This problem is equivalent to OMSSCDH.

[1] David Jao and Vladimir Soukharev. Isogeny-based quantum-resistant undeniablesignatures. InInternational Workshop on Post-Quantum Cryptography, pages 160–179. Springer, 2014. 35 / 50

slide-42
SLIDE 42

Security Proofs

Jao-Soukharev

But... ◮ Messages curves are computed via the hash function H. ◮ The adversary can only query the oracle with messages.

36 / 50

slide-43
SLIDE 43

Security Proofs

Jao-Soukharev

But... ◮ Messages curves are computed via the hash function H. ◮ The adversary can only query the oracle with messages. ◮ Forging messages seems therefore harder than solving OMSSCDH.

36 / 50

slide-44
SLIDE 44

Attack on the Signature Scheme

Let M be the message for which we wish to forge a signature.

37 / 50

slide-45
SLIDE 45

Attack on the Signature Scheme

Let M be the message for which we wish to forge a signature.

Lemma

Let E be a supersingular elliptic curve, let ℓ be a prime, let e be an integer, and let {P, Q} be a basis for E[ℓe]. Let α, β < ℓe be positive integers congruent modulo ℓk for some integer k < e. Then the ℓ-isogeny paths from E to Eα = E/P + [α]Q and Eβ = E/P + [β]Q are equal up to the k-th step.

37 / 50

slide-46
SLIDE 46

An attack against OMSSCDH

E

  • EB

EB′ EA

  • EAB

EAB′ Aim: use the lemma to extend this idea to EB′ further from EB.

38 / 50

slide-47
SLIDE 47

Attack on the Signature Scheme

EA EAB′ EAB φ1 φ2 φeB′ φeB

39 / 50

slide-48
SLIDE 48

Attack on the Signature Scheme

Finding ψ

EA EAB′ EAB φ1 φ2 ψB′, deg(ψB′) = ℓk

B

ψB, deg(ψB) = ℓk

B

φeB′ φeB ◮ ψ = ψB ◦ ˆ ψB′. ◮ The probability of correctly identifying ψ with a single guess is

1 (ℓB+1)ℓ2k−1

B

.

40 / 50

slide-49
SLIDE 49

Attack on the Signature Scheme

Validity of σ

Assume: ψ (and hence, EAB) has been guessed correctly. Let honest σ = (EAB, P, Q), forgery σF = (EAB, PF, QF). Oracle: σ′ = (EAB′, P′ = φB′A(φB′(PC)), Q′ = φB′A(φB′(QC))). ◮ For confirmation/disavowal:

◮ EσC = E/[mc]PF + [nc]QF ◮ EABC = [mc]P + [nc]Q

41 / 50

slide-50
SLIDE 50

Attack on the Signature Scheme

Validity of σ

Assume: ψ (and hence, EAB) has been guessed correctly. Let honest σ = (EAB, P, Q), forgery σF = (EAB, PF, QF). Oracle: σ′ = (EAB′, P′ = φB′A(φB′(PC)), Q′ = φB′A(φB′(QC))). ◮ ψ takes a point on EAB′ to a point on EAB. ◮ ψ(P′) = ψ(φB′A(φB′(PC))) = ψ(φAB′(φA(PC))) ∈ EAB[ℓeC

C ].

42 / 50

slide-51
SLIDE 51

Attack on the Signature Scheme

Validity of σ

EA EAB′ EAB φ1 φ2 ˆ ψB′ = ˆ φeB−k ◦ · · · ◦ ˆ φe′

B

φeB′ φeB ◮ φAB′ : EA → EAB′. ◮ ˆ ψB′ ◦ φAB′ = [ℓk

B]φeB−k−1 ◦ · · · ◦ φ1.

43 / 50

slide-52
SLIDE 52

Attack on the Signature Scheme

◮ Find M′ such that H(M) and H(M′) differ by a large power of ℓB. ◮ Submit M′ to the signing oracle, to receive σ′ = (EAB′, P′, Q′). ◮ Guess the ℓ2k

B -isogeny ψ : EAB′ → EAB where EAB is the

unknown curve corresponding to M. ◮ Find s such that sℓk

B ≡ 1 mod ℓeC C .

◮ Compute {[s] · ψ(P′), [s] · ψ(Q′)}. ◮ Output σF = (EAB, [s] · ψ(P′), [s] · ψ(Q′)).

44 / 50

slide-53
SLIDE 53

Attack on the Signature Scheme

Validity of σ

Theorem (Validity of σ)

Let M, M′, s, ψ, P′ and Q′ are defined as in the attack. Let σF = (EAB, [s] · ψ(P′), [s] · ψ(Q′)) be the output of our attack. Assuming EAB is guess correctly, σF is a valid signature for M.

45 / 50

slide-54
SLIDE 54

Attack on the Signature Scheme

Attack Cost

Let λ be our security parameter. Classical security: Take 2L = 22λ. Quantum security: Take 2L = 23λ. Previous Expected Cost: 2λ.

46 / 50

slide-55
SLIDE 55

Attack on the Signature Scheme

Attack Cost

Classical Cost Near collision of L1 bits: 2L1/2 Pr[EAB guessed correctly]: 2−2(L−L1) Take L1 = 4L

5 . Then, total cost:

22L/5

47 / 50

slide-56
SLIDE 56

Attack on the Signature Scheme

Attack Cost

Classical Cost Near collision of L1 bits: 2L1/2 Pr[EAB guessed correctly]: 2−2(L−L1) Take L1 = 4L

5 . Then, total cost:

22L/5 Quantum Cost Near collision of L1 bits: 2L1/3 Pr[EAB guessed correctly]: 2−2(L−L1) Take L1 = 6L

7 . Then, total cost:

22L/7

47 / 50

slide-57
SLIDE 57

Attack on the Signature Scheme

Attack Cost

◮ Unforgeability is broken.

48 / 50

slide-58
SLIDE 58

Attack on the Signature Scheme

Attack Cost

◮ Unforgeability is broken. ◮ For the same level of security, must increase parameters by 25% for classical security (17% for quantum security).

48 / 50

slide-59
SLIDE 59

Attack on the Signature Scheme

Attack Cost

◮ Unforgeability is broken. ◮ For the same level of security, must increase parameters by 25% for classical security (17% for quantum security). ◮ The attack implies invisibility is broken.

48 / 50

slide-60
SLIDE 60

Conclusion

The OMSSCDH Problem and the 1MSSCDH Problem are solvable in polynomial time (with a single query!). We have an attack to break the unforgeability and invisibility properties of two undeniable signature schemes:

  • 1. Jao-Soukharev, 2014 [1]
  • 2. Srinath-Chandrasekaran, 2018 [2]

[1] D Jao and V Soukharev. Isogeny-based quantum-resistant Undeniable Signatures. In International Workshop on Post-Quantum Cryptography, pages 160–179. Springer, 2014. [2] M Seshadri Srinath and V Chandrasekaran. Isogeny-based Quantum-resistant Undeniable Blind Signature

  • Scheme. International Journal of Network Security,20(1):9–18, 2018

49 / 50

slide-61
SLIDE 61

Thank you for listening!

You can read more at: https://eprint.iacr.org/2019/950

50 / 50