Financial Cryptography 2001 19-22 February 2001 Grand Cayman - - PDF document

financial cryptography 2001
SMART_READER_LITE
LIVE PREVIEW

Financial Cryptography 2001 19-22 February 2001 Grand Cayman - - PDF document

Financial Cryptography 2001 19-22 February 2001 Grand Cayman Islands - BWI Monotone Signatures Joint work with David Naccache and Christophe Tymen (Gemplus, France) David Pointcheval Dpartement d Informatique ENS - CNRS


slide-1
SLIDE 1

David Pointcheval Département d ’Informatique ENS - CNRS

Financial Cryptography ‘ 2001

19-22 February 2001 Grand Cayman Islands - BWI

David.Pointcheval@ens.fr http://www.di.ens.fr/users/pointche Joint work with David Naccache and Christophe Tymen (Gemplus, France)

Monotone Signatures

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 2 David Pointcheval ENS-CNRS

Overview Overview

◆ Introduction ◆ Monotone Signatures ◆ Attackers

  • Immediate Attacks
  • Delayed Attacks

◆ Optimized Solution ◆ Conclusion

slide-2
SLIDE 2

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 3 David Pointcheval ENS-CNRS

Cryptography Cryptography

Cryptography proposes many solutions for ◆ Confidentiality ◆ Authentication ◆ Integrity ◆ … but often based on some secret data

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 4 David Pointcheval ENS-CNRS

Corruption Corruption

However, no secret can be guaranteed for any time ◆ Corruption ◆ Kidnapping to force the authority to publish the secret data in the newspaper

slide-3
SLIDE 3

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 5 David Pointcheval ENS-CNRS

E E-

  • cash

cash

We can easily prevent duplication of coins while checking double/multiple spending However, we are aware of the problem caused by the so-called Bank-Robbery Attack ⇒ protections have been found, but they are very costly

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 6 David Pointcheval ENS-CNRS

ID Cards ID Cards

Previous protections (against Bank-Robbery Attacks) require an on-line context, which is not suitable to any situation such as ID-cards, Driving License, etc Another possibility: threshold signature but one cannot prevent a massive corruption of k share-holders

slide-4
SLIDE 4

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 7 David Pointcheval ENS-CNRS

Achievement Achievement

A Signature Scheme such that, after a corruption, one updates the verification process in such a way that

  • nly “really” valid signatures

are accepted However, at the time of the corruption, the adversary “thinks” he holds the secret key

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 8 David Pointcheval ENS-CNRS

Signatures Signatures

Signing Algorithm Verification Algorithm Security: it is impossible to produce a new valid pair (m,σ)

P S

m σ True/False m

slide-5
SLIDE 5

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 9 David Pointcheval ENS-CNRS

Monotone Predicates Monotone Predicates

The Verification Algorithm checks a predicate: (m,σ) =

P(m,σ)

Predicates

1, 2,…, n are said to be

monotone if for any input x

n(x) ⇒ n-1(x) ⇒… ⇒ 2(x) ⇒ 1(x)

  • 1(x) = x is an integer
  • 2(x) = x is even
  • 3(x) = x is zero

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 10 David Pointcheval ENS-CNRS

Monotone Signature Monotone Signature

◆ A Key Generation Algorithm (1k,1n) → (S1,…,Sn;P1,…,Pn) ◆ A Signing Algorithm S1,…,Sn(m) → σ ◆ A list of n Monotone Verifying Algorithms i

P1,…,Pi(m,σ) → True/False

for i=1,…,n

slide-6
SLIDE 6

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 11 David Pointcheval ENS-CNRS

Properties Properties

As for any Signature Scheme: ◆ Completeness: σ = S1,…,Sn(m) ⇒ n

P1,…,Pn(m,σ) =True

◆ Soundness: (No Existential Forgery) for any adversary A, the probability of (m,σ)←A(S1,…,Si-1,P1,…,Pi): i

P1,…,Pi(m,σ) = True

is negligible

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 12 David Pointcheval ENS-CNRS

Indistinguishability Indistinguishability

Missing public keys must not change the distribution: For any i ≤ n, there exists a simulator such that the distributions, for any m

  • S1,…,Si(m)
  • S1,…,Sn(m)

are indistinguishable for someone who does not know the Si+1,…,Sn

slide-7
SLIDE 7

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 13 David Pointcheval ENS-CNRS

Attacks Attacks

As usual, one can consider ◆ no-message attacks:

the adversary just knows the verification algorithm (i.e. the public key)

◆ known-message attacks:

she knows some message-signature pairs

◆ (adaptively) chosen-message attacks:

she has access to a signature oracle

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 14 David Pointcheval ENS-CNRS

Corruption Corruption

But we have to consider the corruption: the adversary

  • gets some secret keys S1,…,Sj
  • checks their validity w.r.t. P1,…,Pj

◆ immediate attacks:

the adversary forges signatures before the update to

j+1P1,…,Pj+1 (thus without Pj+1)

◆ delayed attacks:

the adversary waits for the new verification algorithm (with Pj+1) before starting to forge

slide-8
SLIDE 8

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 15 David Pointcheval ENS-CNRS

Immediate Attacks Immediate Attacks

◆ runs the Key Generation Algorithm (1k,1n) → (S1,…,Sn;P1,…,Pn) ◆ publishes a partial public key (P1,…,Pi) ◆ produces signatures

S1,…,Sn(m) → σ

◆ Corruption: the adversary gets (S1,…,Sj) ◆ Forgeries: the adversary forges new signatures ◆ publishes new public keys (Pi+1,…)

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 16 David Pointcheval ENS-CNRS

Random Random-

  • looking Redundancy

looking Redundancy

To prevent immediate attacks,

  • ne can simply use
  • subliminal channel (low bandwidth)
  • secret-redundancy

From a signature scheme (,,),

  • ne signs a redundant message

µ = m || r, where r “looks” random but ri = fi (m,r1,…,ri-1) for some i

slide-9
SLIDE 9

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 17 David Pointcheval ENS-CNRS

Symmetric Monotone Signatures Symmetric Monotone Signatures

The published verification key is just the public key of the basic scheme After corruption (and thus publication of the signing key), one publishes some redundancy criteria ⇒ immediate forgeries will be spotted Further corruptions (under immediate attacks) will be prevented until some secret redundancy remains.

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 18 David Pointcheval ENS-CNRS

Delayed Attacks Delayed Attacks

◆ runs the Key Generation Algorithm (1k,1n) → (S1,…,Sn;P1,…,Pn) ◆ publishes a partial public key (P1,…,Pi) ◆ produces signatures

S1,…,Sn(m) → σ

◆ Corruption: the adversary gets (S1,…,Sj) ◆ publishes new public keys (Pi+1,…) ◆ Forgeries: the adversary forges new signatures

slide-10
SLIDE 10

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 19 David Pointcheval ENS-CNRS

Concatenation of Signatures Concatenation of Signatures

To prevent delayed attacks,

  • ne can concatenate mixture
  • f signatures and random strings:

S1,…,Sn(m) = S1(m) || S2(m) || R3 || S4(m) || ... || Rn But then, the distributions, for any key Si, and any message m,

Si(m) and R ← {0,1}l

must be indistinguishable

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 20 David Pointcheval ENS-CNRS

Verification of (m,σ) : test whether e=h(m, gs ye)

Example: Example: Schnorr’s Schnorr’s Signature Signature

= <g> of prime order q x : secret key y=gx : public key Signature of the message m : from a random k∈q get r=gk then e=h(m,r) and s = k-xe mod q σ = (e,s) Actually (m) = (e,s) ∈R q × q ⇒ indistinguishable from a random pair Don’t use (r,s) as output signature!

slide-11
SLIDE 11

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 21 David Pointcheval ENS-CNRS

Properties Properties

◆ At least n Schnorr’s signatures to prevent up to n corruptions ◆ And about n random values as well Therefore: ◆ Cost: n times the basic computational time

  • n exponentiation per signature
  • 2i exponentiations per verification

◆ Length: 2n times the basic length ⇒ 2n × 320 bits = 80 n Bytes

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 22 David Pointcheval ENS-CNRS

Okamoto Okamoto-

  • Schnorr Signature

Schnorr Signature

Extending the Okamoto’s variant: = <g> of order q and g1,…,gn ∈

  • (x1,…,xn): secret key
  • y=g1x1 …gnxn: public key

◆ Signature of m:

  • t1,…,tn and then r=g1t1 …gntn
  • get e=h(m,r)
  • si = ti-xie mod q

◆ Verification: e=h(m, g1

s1 …gn sn ye)

slide-12
SLIDE 12

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 23 David Pointcheval ENS-CNRS

Degrees of Freedom Degrees of Freedom

e=h(m, g1

s1 …gn sn ye)

Without any relation between the gi‘s,

  • ne has no freedom about the si‘s,

since e is provided once the ti’s are fixed With some relations, one can hide secret redundancy into some si‘s. The more relations are known, the more of si‘s can be chosen: si=fi(m||r)

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 24 David Pointcheval ENS-CNRS

Properties Properties

◆ At least k relations must exist to prevent up to k corruptions ◆ And about k independent values as well Therefore: ◆ Cost:

  • k exponentiation per signature
  • 2k exponentiations per verification

◆ Length: only 2k+1 elements in

q

⇒ (2k+1) × 160 bits ≈ 40 k Bytes

slide-13
SLIDE 13

Monotone Signatures Financial Cryptography ‘2001 - Grand Cayman Island - BWI - February 2001 - 25 David Pointcheval ENS-CNRS

Conclusion Conclusion

Monotone Signatures propose new features ◆ Resistance against many corruptions, ◆ Prevention of the immediate attacks:

  • Symmetric Monotone Signatures

which are almost as efficient as the basic signature scheme

◆ Prevention of the delayed attacks:

  • Concatenation of Signatures
  • Signatures with various degrees of freedom

can improve efficiency