From Identification to Signatures, Tightly: A Framework and Generic Transforms
Mihir Bellare, Bertram Poettering, Douglas Stebila UCSD / Ruhr University Bochum / McMaster ASIACRYPT 2016, Hanoi December 6, 2016
From Identification to Signatures, Tightly: A Framework and Generic - - PowerPoint PPT Presentation
From Identification to Signatures, Tightly: A Framework and Generic Transforms Mihir Bellare, Bertram Poettering , Douglas Stebila UCSD / Ruhr University Bochum / McMaster ASIACRYPT 2016, Hanoi December 6, 2016 Signature schemes In a nutshell
Mihir Bellare, Bertram Poettering, Douglas Stebila UCSD / Ruhr University Bochum / McMaster ASIACRYPT 2016, Hanoi December 6, 2016
In a nutshell
sk m Sign σ σ vk m Vrf 0/1 Examples and applications
From Identification to Signatures, Tightly: A Framework and Generic Transforms 2 / 20
FS transform is versatile
Standardized instantiations of FS/Schnorr
Evolution of security argument (always ROM)
From Identification to Signatures, Tightly: A Framework and Generic Transforms 3 / 20
Observations
◮ due to forking/reset lemma ◮ consequence: large keys and signatures
Contributions
◮ instantiations from GQ, MR, CFP
◮ depend on new security requirements for ID ◮ tight reductions in all cases
◮ finding the right abstraction boundaries From Identification to Signatures, Tightly: A Framework and Generic Transforms 4 / 20
sk m Sign σ σ vk m Vrf 0/1 Unforgeability (UF)
Unique unforgeability (UUF)
Transforms UUF → UF?
From Identification to Signatures, Tightly: A Framework and Generic Transforms 5 / 20
DR: Removing randomness
AR: Adding randomness
Security
From Identification to Signatures, Tightly: A Framework and Generic Transforms 6 / 20
Prover (pk, sk) Verifier (pk) (Y , y) ←$ Cmt Y (commitment) c ← $ c (challenge) z ← Rsp(sk, y, c) z (response) Vrf(pk, Y cz) = 0/1
From Identification to Signatures, Tightly: A Framework and Generic Transforms 7 / 20
Prover (pk, sk, tk) Verifier (pk) Y ←$ CmtSp y ← Cmt−1(tk, Y ) Y (commitment) c ← $ c (challenge) z ← Rsp(sk, y, c) z (response) Vrf(pk, Y cz) = 0/1 Trapdoor property
(Y , y) ←$ Cmt ≈ Y ←$ CmtSp; y ← Cmt−1(tk, Y )
From Identification to Signatures, Tightly: A Framework and Generic Transforms 8 / 20
Prover (pk, sk, tk) Verifier (pk) Y ←$ CmtSp y ← Cmt−1(tk, Y ) Y (commitment) c ← $ c (challenge) z ← Rsp(sk, y, c) z (response) Vrf(pk, Y cz) = 0/1 Impersonation resilience
◮ public key pk ◮ transcript oracle: provides fresh Y , c, z ◮ challenge oracle: on input Y provides fresh c, expects z
From Identification to Signatures, Tightly: A Framework and Generic Transforms 9 / 20
Prover (pk, sk, tk) Verifier (pk) Y ←$ CmtSp y ← Cmt−1(tk, Y ) Y (commitment) c ← $ c (challenge) z ← Rsp(sk, y, c) z (response) Vrf(pk, Y cz) = 0/1 Signatures from IMP-PA
Observations
From Identification to Signatures, Tightly: A Framework and Generic Transforms 10 / 20
Constrained impersonation framework
◮ public key pk ◮ transcript oracle: provides fresh Y , c, z ◮ challenge oracle of type xy
Meaning of xy ∈ {CC, CU, UC, UU}
Note CIMP-CU is multi-challenge version of IMP-PA
From Identification to Signatures, Tightly: A Framework and Generic Transforms 11 / 20
Games for CIMP-{CU, CC, UC, UU} Game CIMP (pk, sk) ← KGen z ← ATr,Ch(pk) v ← Vrf(pk, Y cz) Output v Tr() (Y , y) ← Cmt c ← $ z ← Rsp(sk, y, c) Return Y cz Ch(Y , c) CC Return Y c Ch(Y ) CU c ← $ Return Y c Ch(i, c) UC Y ← Yi Return Y c Ch(i) UU Y ← Yi c ← $ Return Y c
From Identification to Signatures, Tightly: A Framework and Generic Transforms 12 / 20
Games for CIMP-{CU, CC, UC, UU} Game CIMP (pk, sk) ← KGen z ← ATr,Ch(pk) v ← Vrf(pk, Y cz) Output v Tr() (Y , y) ← Cmt c ← $ z ← Rsp(sk, y, c) Return Y cz Ch(Y , c) CC Return Y c Ch(Y ) CU c ← $ Return Y c Ch(i, c) UC Y ← Yi Return Y c Ch(i) UU Y ← Yi c ← $ Return Y c
From Identification to Signatures, Tightly: A Framework and Generic Transforms 12 / 20
CC UU CU UC
Games for CIMP-{CU, CC, UC, UU} Game CIMP (pk, sk) ← KGen z ← ATr,Ch(pk) v ← Vrf(pk, Y cz) Output v Tr() (Y , y) ← Cmt c ← $ z ← Rsp(sk, y, c) Return Y cz Ch(Y , c) CC Return Y c Ch(Y ) CU c ← $ Return Y c Ch(i, c) UC Y ← Yi Return Y c Ch(i) UU Y ← Yi c ← $ Return Y c
From Identification to Signatures, Tightly: A Framework and Generic Transforms 12 / 20
CC UU CU UC
Fiat-Shamir (our view on it)
Sign(sk, m) (Y , y) ←$ Cmt c ← H(Y , m) z ← Rsp(sk, y, c) σ ← (Y , z) Vrf(vk, m, σ) (Y , z) ← σ c ← H(Y , m) T ← Y cz v ← Vrf(vk, T) Security
From Identification to Signatures, Tightly: A Framework and Generic Transforms 13 / 20
CC UU CU UC
MdCmt (message-dependent commitment)
Sign(sk, m) Y ← H(m) y ← Cmt−1(tk, Y ) c ← $ z ← Rsp(sk, y, c) σ ← (c, z) Vrf(vk, m, σ) (c, z) ← σ Y ← H(m) T ← Y cz v ← Vrf(vk, T) Security
From Identification to Signatures, Tightly: A Framework and Generic Transforms 14 / 20
CC UU CU UC
MdCmtCh (message-dependent commitment and challenge)
Sign(sk, m) Y ← H1(m) y ← Cmt−1(tk, Y ) b ←$ {0, 1} c ← H2(mb) z ← Rsp(sk, y, c) σ ← (b, z) Vrf(vk, m, σ) (b, z) ← σ Y ← H1(m) c ← H2(mb) T ← Y cz v ← Vrf(vk, T) Security
From Identification to Signatures, Tightly: A Framework and Generic Transforms 15 / 20
CC UU CU UC
MdCh (message-dependent challenge)
Sign(sk, m) (Y , y) ←$ Cmt s ← $ c ← H(ms) z ← Rsp(sk, y, c) σ ← (Y , s, z) Vrf(vk, m, σ) (Y , s, z) ← σ c ← H(ms) T ← Y cz v ← Vrf(vk, T) Security
From Identification to Signatures, Tightly: A Framework and Generic Transforms 16 / 20
CC UU CU UC
Theory If ID scheme is HVZK and extractable
ID scheme where Y = ǫ and z = Sign(sk, c) provides CIMP-CC Practice Guillou-Quisquater is trapdoor and gives CIMP-UC, CIMP-UU, CIMP-CU
From Identification to Signatures, Tightly: A Framework and Generic Transforms 17 / 20
CC UU CU UC
Hybrid AR ◦ MdCmt
Sign(sk, m) s ← $ Y ← H(m, s) y ← Cmt−1(tk, Y ) c ← $ z ← Rsp(sk, y, c) σ ← (c, z, s) Observations
From Identification to Signatures, Tightly: A Framework and Generic Transforms 18 / 20
CC UU CU UC
Hybrid AR ◦ MdCmt
Sign(sk, m) s ← $ Y ← H(m, s) y ← Cmt−1(tk, Y ) c ← $ z ← Rsp(sk, y, c) σ ← (c, z, s) Ad hoc
Sign(sk, m) c ← $ Y ← H(m, c) y ← Cmt−1(tk, Y ) z ← Rsp(sk, y, c) σ ← (c, z) Observations
From Identification to Signatures, Tightly: A Framework and Generic Transforms 18 / 20
CC UU CU UC
Hybrid DR ◦ MdCmtCh
Sign(sk, m) Y ← H1(m) y ← Cmt−1(tk, Y ) b ← H3(sk, m) c ← H2(mb) z ← Rsp(sk, y, c) σ ← (b, z) Ad hoc
Sign(sk, m) c ← $ Y ← H(m, c) y ← Cmt−1(tk, Y ) z ← Rsp(sk, y, c) σ ← (c, z) Observations
From Identification to Signatures, Tightly: A Framework and Generic Transforms 19 / 20
Contributions
◮ instantiations from GQ, MR, CFP
◮ depend on new security requirements for ID ◮ tight reductions in all cases
◮ finding the right abstraction boundaries
http://eprint.iacr.org/2015/1157
From Identification to Signatures, Tightly: A Framework and Generic Transforms 20 / 20