comparing the pairing efficiency over composite order and
play

Comparing the Pairing Efficiency over Composite-Order and - PowerPoint PPT Presentation

Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves Aurore Guillevic C2, Dinard, France C2 2012 1/23 grid


  1. Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves Aurore Guillevic C2, Dinard, France C2 2012 1/23

  2. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion Outline 1 Introduction 2 BGN protocol with a symmetric pairing 3 BGN conversions 4 Our implementation 5 Conclusion C2 2012 2/23

  3. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion Outline 1 Introduction 2 BGN protocol with a symmetric pairing 3 BGN conversions 4 Our implementation 5 Conclusion C2 2012 3/23

  4. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion Previous work [Boneh, Goh and Nissim, TCC 2005] First public-key � homomorphic encryption scheme using composite-order groups and pairings Based on the Subgroup Decision Assumption � For the last seven years, many protocols with interesting � properties based on this assumption [Freeman, Eurocrypt 2010] Specific conversions to prime-order � groups [Lewko, Eurocrypt 2012] Generic conversions to prime-order � groups and nice security proofs → It remains quite theoretical C2 2012 4/23

  5. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion Contributions Explicit parameter sizes for protocols based on the Subgroup � Decision Assumption at common security levels Implementation in C and benchmarks � C2 2012 5/23

  6. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion Outline 1 Introduction 2 BGN protocol with a symmetric pairing 3 BGN conversions 4 Our implementation 5 Conclusion C2 2012 6/23

  7. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion Subgroup Decision Assumption given a group G of composite order p 1 p 2 = N (e.g. an RSA modulus) without knowing its decomposition into p 1 and p 2 , it is hard to decide whether a given element g ∈ G is in the subgroup of order p 1 . N must be infeasible to factor ⇒ very large parameter sizes. C2 2012 7/23

  8. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion Bilinear Groups 1. G 1 , G 2 and G T are three cyclic groups of order N 2. e : G 1 × G 2 → G T is a bilinear map i.e. for all g 1 , h 1 ∈ G 1 and g 2 , h 2 ∈ G 2 , e ( g 1 · h 1 , g 2 ) = e ( g 1 , g 2 ) · e ( h 1 , g 2 ) and e ( g 1 , g 2 · h 2 ) = e ( g 1 , g 2 ) · e ( g 1 , h 2 ). 2’. for all a , b ∈ Z , g 1 ∈ G 1 , g 2 ∈ G 2 , 2 ) = e ( g 1 , g 2 ) ab = e ( g b e ( g a 1 , g b 1 , g a 2 ). C2 2012 8/23

  9. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion BGN protocol: setup 1. Generate two random τ -bit primes p 1 , p 2 and set N = p 1 p 2 . 2. Generate a (symmetric) bilinear pairing e : G 1 × G 1 → G T with G 1 and G T of order N . 3. Pick two random generators g 1 , u 1 ← G 1 and set h 1 = u p 2 1 ⇒ h 1 is a random generator of the subgroup of order p 1 of G 1 . Set g T = e ( g 1 , g 1 ) as generator of G T and h T = e ( g 1 , h 1 ) = g p 2 T as generator of the subgroup of order p 1 of G T . 4. PK = ( N , G 1 , G T , e , g 1 , h 1 , g T , h T ). SK = p 1 . C2 2012 9/23

  10. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion BGN protocol: encrypt/decrypt Encrypt( PK , m ) : m ∈ N , m < p 2 . Pick a random r ← { 0 , 1 , . . . , N − 1 } . The ciphertext is c = g m 1 · h r 1 ∈ G 1 . Decrypt( SK , c ∈ G 1 ) : We have c p 1 = ( g m 1 ) p 1 = ( g p 1 1 · h r 1 ) m → compute the discrete log of c p 1 in base g p 1 . → very slow, → or m must be very small (few bits). C2 2012 10/23

  11. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion BGN protocol: homomorphic add/mul Add( c 1 , c 2 ) mod N Pick a random r ← { 0 , 1 , . . . , N − 1 } . 1 = g m 1 + m 2 mod N · h r ′ c = c 1 · c 2 · h r 1 ∈ G 1 . 1 Mul( c 3 , c 4 ) mod N (once) Pick a random r ← { 0 , 1 , . . . , N − 1 } . T = g m 3 · m 4 mod N · h r ′ c = e ( c 3 , c 4 ) · h r T ∈ G T . T Add( c 5 , c 6 ) mod N Pick a random r ← { 0 , 1 , . . . , N − 1 } . T = g m 5 + m 6 mod N · h r ′ c = c 5 · c 6 · h r T ∈ G T . T C2 2012 11/23

  12. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion BGN in practice Suitable elliptic curve: easy to generate � 1. Let N a composite-order modulus (generated with e.g. openssl ). 2. Find the smallest integer h , 4 | h , such that hN − 1 is prime. p ) : y 2 = x 3 − x is 3. Let p = hN − 1. The elliptic curve E ( F supersingular, of order hN = p + 1 and embedding degree 2. Moreover, an explicit isomorphism G 1 → G 2 is available, hence the pairing is symmetric. Tate pairing only (one of the worst pairings in speed). � Parameter sizes: 3072 � log N � 3248 (NIST–Ecrypt). � C2 2012 12/23

  13. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion BGN variants Over composite-order groups made of several distinct primes � Each information is hidden in a subgroup � The parameter sizes depend on the Number Field Sieve (NFS) � attack and the Elliptic Curve Method (ECM) attack C2 2012 13/23

  14. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion Outline 1 Introduction 2 BGN protocol with a symmetric pairing 3 BGN conversions 4 Our implementation 5 Conclusion C2 2012 14/23

  15. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion Freeman and Lewko Conversions As operations are much faster on a prime-order elliptic curve � than a composite-order one, the protocol is built on this prime-order curve. It uses a vector of elements in the same prime-order group: � each copy of the prime-order group corresponds to a subgroup in the composite-order setting. To distinguish between the different copies, elements are � generated from different generators. The protocol security relies on the d -Linear Problem, an � extension of the Diffie-Hellman Problem. New properties to achieve: projecting pairings and cancelling � pairings. C2 2012 15/23

  16. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion BGN Conversion: setup 1. Let ( G 1 , G 2 , G T ) three cyclic groups of prime order n with a pairing e : G 1 × G 2 → G T . 2. Let G 1 = G 2 1 , G 2 = G 2 2 , G T = G 4 T . 3. Choose random generators g 1 ∈ G 1 , g 2 ∈ G 2 and let g T = e ( g 1 , g 2 ). � a 1 � � a 2 � b 1 b 2 4. Choose random , ∈ SL 2 ( F n ). c 1 d 1 c 2 d 2 5. Let H 1 be the subgroup of G 1 generated by h 1 = ( g a 1 1 , g b 1 1 ), let H 2 be the subgroup of G 2 generated by h 2 = ( g a 2 2 , g b 2 2 ). 6. Define a pairing e : G 1 × G 2 → G T by e ([ u 1 , v 1 ] , [ u 2 , v 2 ]) = [ e ( u 1 , u 2 ) , e ( u 1 , v 2 ) , e ( v 1 , u 2 ) , e ( v 1 , v 2 )]. 7. Let H T = � e ( h 1 , h 2 ) , e ( h 1 , [ g c 2 2 , g d 2 2 ]) , e ([ g c 1 1 , g d 1 1 ] , h 2 ) � ⊂ G T . C2 2012 16/23

  17. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion BGN Conversion: setup 8. The analogous of computing c p 1 is computing a projecting map π 1 , π 2 or π T from the groups G 1 , G 2 or G T s.t. H ∗ ⊂ Ker( π ∗ ) and e ( π 1 ( u ) , π 2 ( v )) = π T ( e ( u , v )). ′ 9. The public parameters are ( G 1 , H 1 , G 2 , H 2 , G T , G T , e , g 1 , g 2 ) and the secret trapdoors are π 1 , π 2 and π T which need the numbers a 1 , b 1 , . . . , d 2 , e.g. π 1 ([ u 1 , v 1 ]) = [ u − b 1 c 1 · v a 1 c 1 , u − b 1 d 1 · v a 1 d 1 ]. 1 1 1 1 Homomorphic properties: The message is hidden in the exponent and a random blinding � term from the subgroup is added. To decrypt, a discrete logarithm is needed. � C2 2012 17/23

  18. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion Outline 1 Introduction 2 BGN protocol with a symmetric pairing 3 BGN conversions 4 Our implementation 5 Conclusion C2 2012 18/23

  19. grid Introduction BGN protocol with a symmetric pairing BGN conversions Our implementation Conclusion LibCryptoLCH The LibCryptoLCH is a proprietary cryptographic library developed inside the Crypto Lab (Laboratoire Chiffre) at THALES. p arithmetic with Montgomery representation F � multiplication in Intelx86 assembly language can be activated (thanks to F. de Portzamparc) same high-level pairing optimizations as in the most efficient � papers generic design : may use any p or elliptic curve � modular approach � Curve, Pairing k log 2 m log 2 p Miller L. F. Exp. Pairing Ssingular, Tate 2 256 1536 19.7 ms 20.5 ms 40.2 ms BN, Opt. Ate 12 256 256 2.4 ms 3.0 ms 5.4 ms Pairings with normal NIST parameter sizes for a 128-bit security level, PC Linux Intel x86, 2.6 GHz C2 2012 19/23

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend