g g t are finite cyclic groups of prime order p where g g
play

G , G , T are finite cyclic groups of prime order p , where G = G - PowerPoint PPT Presentation

S HORT S TRUCTURE -P RESERVING S IGNATURES Essam Ghadafi e.ghadafi@ucl.ac.uk Department of Computer Science, University College London CT-RSA 2016 S HORT S TRUCTURE -P RESERVING S IGNATURES O UTLINE B ACKGROUND 1 O UR S CHEME 2 E FFICIENCY C


  1. S HORT S TRUCTURE -P RESERVING S IGNATURES Essam Ghadafi e.ghadafi@ucl.ac.uk Department of Computer Science, University College London CT-RSA 2016 S HORT S TRUCTURE -P RESERVING S IGNATURES

  2. O UTLINE B ACKGROUND 1 O UR S CHEME 2 E FFICIENCY C OMPARISON 3 S OME A PPLICATIONS 4 S UMMARY & O PEN P ROBLEMS 5 S HORT S TRUCTURE -P RESERVING S IGNATURES

  3. (P RIME -O RDER ) B ILINEAR G ROUPS G , ˜ G , T are finite cyclic groups of prime order p , where G = � G � and ˜ G = � ˜ G � Pairing ( e : G × ˜ G − → T ) : The function e must have the following properties: Bilinearity: ∀ P ∈ G , ∀ ˜ Q ∈ ˜ G , ∀ x , y ∈ Z , we have e ( P x , ˜ Q y ) = e ( P , ˜ Q ) xy Non-Degeneracy: The value e ( G , ˜ G ) � = 1 generates T The function e is efficiently computable Type-III [GPS08]: G � = ˜ G and no efficiently computable homomorphism between G and ˜ G in either direction S HORT S TRUCTURE -P RESERVING S IGNATURES 2 / 19

  4. S TRUCTURE -P RESERVING S IGNATURES Some History: The term “Structure-Preserving” was coined by Abe et al. 2010 Earlier constructions: Groth 2006 and Green and Hohenberger 2008 Many constructions in the 3 different main types of bilinear groups Optimal Type-III constructions are the most efficient S HORT S TRUCTURE -P RESERVING S IGNATURES 3 / 19

  5. S TRUCTURE -P RESERVING S IGNATURES What are they? D EFINITION (A S TRUCTURE -P RESERVING S IGNATURE ) A signature scheme (defined over bilinear groups) where: m , vk and σ are elements of G and/or ˜ G Verifying signatures only involves deciding group membership and evaluating pairing-product equations (PPE): B j ) c i , j = Z , � � e ( A i , ˜ i j B j ∈ ˜ where A i ∈ G , ˜ G and Z ∈ T are group elements appearing in P , m , vk , σ , whereas c i , j ∈ Z p are constants S HORT S TRUCTURE -P RESERVING S IGNATURES 4 / 19

  6. S TRUCTURE -P RESERVING S IGNATURES Why Structure-Preserving Signatures? Compose well with other pairing-based schemes • Easy to encrypt Compose well with ElGamal/BBS linear encryption • Easy to combine with NIZK proofs Compose well with Groth-Sahai proofs S HORT S TRUCTURE -P RESERVING S IGNATURES 5 / 19

  7. A PPLICATIONS OF S TRUCTURE -P RESERVING S IGNATURES Applications of Structure-Preserving Signatures: Blind signatures Group signatures Malleable signatures Tightly secure encryption schemes Anonymous credentials Oblivious transfer Network coding . . . S HORT S TRUCTURE -P RESERVING S IGNATURES 6 / 19

  8. E XISTING L OWER B OUNDS Lower Bounds (for unilateral messages) in Type-III Bilinear Groups (Abe et al. 2011): Signatures contain at least 3 group elements Signatures cannot be unilateral (must contain elements from both G and ˜ G ) • Note: Size of elements of ˜ G are at least twice as big as those of G At least 2 PPE verification equations S HORT S TRUCTURE -P RESERVING S IGNATURES 7 / 19

  9. O UR C ONTRIBUTION A new signature scheme in Type-III bilinear groups with shorter signatures than existing ones: • Signatures consist of 3 elements from G (i.e. unilateral) • 2 PPE verification equations (5 pairings in total) • Message space is the set of Diffie-Hellman pairs (Abe et al. 2010): The set ˆ G = { ( M , ˜ N ) | ( M , ˜ N ) ∈ G × ˜ G , e ( M , ˜ G ) = e ( G , ˜ N ) } More efficient instantiations of some existing cryptographic protocols (e.g. DAA) S HORT S TRUCTURE -P RESERVING S IGNATURES 8 / 19

  10. O UR S CHEME The Underlying Idea: Can be viewed as an extension of the non-structure-preserving scheme of Pointcheval and Sanders (CT-RSA 2016) Can be viewed as a more efficient variant of Ghadafi (ACISP 2013) Camenisch-Lysyanskaya based structure-preserving scheme S HORT S TRUCTURE -P RESERVING S IGNATURES 9 / 19

  11. O UR S CHEME The Scheme: KeyGen: Choose x , y ← Z p , set sk := ( x , y ) and pk := (˜ X := ˜ G x , ˜ Y := ˜ G y ) ∈ ˜ G 2 N ) ∈ ˆ Sign: To sign ( M , ˜ G , p , σ := ( A := G a , B := M a , C := A x · B y ) ∈ G 3 • Choose a ← Z × N ) ∈ ˆ Verify: Check that A � = 1 G and ( M , ˜ G and e ( A , ˜ N ) = e ( B , ˜ G ) e ( C , ˜ G ) = e ( A , ˜ X ) e ( B , ˜ Y ) Randomize: Choose r ← Z × p , return σ ′ := ( A ′ := A r , B ′ := B r , C ′ := C r ) S HORT S TRUCTURE -P RESERVING S IGNATURES 10 / 19

  12. P ROPERTIES OF THE S CHEME Some Properties of the Scheme: The scheme is secure in the generic group model • ⇒ alternatively can be based on an interactive assumption Unilateral signatures (Perfectly) Fully re-randomizable Only M part of the message is needed for signing S HORT S TRUCTURE -P RESERVING S IGNATURES 11 / 19

  13. E FFICIENCY C OMPARISON Size Verification Scheme R? Assumptions vk PPE Pairing P m σ G 4 × ˜ [GH08] a G 2 ˜ G - G Y q -HLRSW 4 8 G 3 × ˜ G 2 G × ˜ G 3 ˆ [Fuc09] G G N q -ADHSDH+AWFCDH 3 9 G 5 × ˜ G 10 × ˜ G 2 G 4 [AFG+10] I - G P q -SFP 2 12 G 2 × ˜ G 10 × ˜ G 5 G 4 ˜ [AFG+10] II - G P q -SFP 2 12 G 2 × ˜ G × ˜ G 3 G × ˜ [AGH+11] I G - G N GGM 2 7 G 2 × ˜ G × ˜ ˜ [AGH+11] II G G - G Y GGM 2 5 G 4 G 2 ˜ ˆ [Gha13] - G Y DH-LRSW 3 7 G × ˜ G 2 G 2 ˜ G [CM14] I - N GGM 2 5 G × ˜ G 2 G 2 ˜ G [CM14] II - Y GGM 2 6 G 2 × ˜ G 2 ˜ G G [CM14] III - Y GGM 2 6 G 3 × ˜ ˜ [AGO+14] I G G G G Y GGM 2 6 G 2 × ˜ ˜ [AGO+14] II G G G G N GGM 2 6 G × ˜ ˜ G 2 G 2 [BFF15] - G Y GGM 2 5 G × ˜ ˜ ˜ G 2 [Gro15] I G G G Y GGM 2 6 G × ˜ ˜ ˜ G 2 [Gro15] II G G G N GGM 2 7 ˜ ˆ G 3 G 2 Ours - G Y GGM 2 5 a This scheme is only secure against a random message attack. S HORT S TRUCTURE -P RESERVING S IGNATURES 12 / 19

  14. E FFICIENCY C OMPARISON Comparison with schemes with the same message space Size Verification Scheme R? Assumptions vk PPE Pairing P σ G 3 × ˜ G 2 G × ˜ G 3 [Fuc09] G N q -ADHSDH+AWFCDH 3 9 or (7 & 2 ECAdd) ˜ G 4 G 2 [Gha13] - Y DH-LRSW 3 7 or (6 & 1 ECAdd) ˜ G 3 G 2 Ours - Y GGM 2 5 * Cost does not include checking well-formedness of the message S HORT S TRUCTURE -P RESERVING S IGNATURES 13 / 19

  15. G ENERIC C ONSTRUCTION OF DAA Bernhard et al. 2013 gave a generic construction of DAA which requires the following tools: Randomizable Weakly Blind Signatures (RwBS) • Used by the Issuer to issue certificates as credentials when users join the group Linkable Indistinguishable Tags (LIT) • Needed to provide the linkability of signatures when the same basename is signed by the same user Signatures of Knowledge (SoK) • Used by users to prove they have a credential and that the signature on the basename verifies w.r.t. thier certified secret key S HORT S TRUCTURE -P RESERVING S IGNATURES 14 / 19

  16. B LIND S IGNATURES �� �� ���� ������ S HORT S TRUCTURE -P RESERVING S IGNATURES 15 / 19

  17. B LIND S IGNATURES �� �� ���� Sig ���� ������ S HORT S TRUCTURE -P RESERVING S IGNATURES 15 / 19

  18. B LIND S IGNATURES �� �� ���� Sig Sig ���� ������ Security Requirements: Blindness: An adversary (i.e. a signer) who chooses the messages, does not learn which message being signed and cannot link a signature to its signing session Unforgeability: An adversary (i.e. a user) cannot forge new signatures S HORT S TRUCTURE -P RESERVING S IGNATURES 15 / 19

  19. B LIND S IGNATURES �� �� ���� Sig Sig ���� ������ Security Requirements: Blindness: An adversary (i.e. a signer) who chooses the messages, does not learn which message being signed and cannot link a signature to its signing session Unforgeability: An adversary (i.e. a user) cannot forge new signatures S HORT S TRUCTURE -P RESERVING S IGNATURES 15 / 19

  20. R ANDOMIZABLE W EAKLY B LIND S IGNATURES (R W BS) Similar to blind signatures but: Randomizability: Given a signature σ , anyone can produce a new signature σ ′ on the same message Weak Blindness: Same as blindness but the adversary never sees the messages ⇒ The adversary cannot tell if he was given a signature on a different message or a re-randomization of a signature on the same message S HORT S TRUCTURE -P RESERVING S IGNATURES 16 / 19

  21. E FFICIENT R W BS WITHOUT R ANDOM O RACLES The Idea: Combine the new scheme with SXDH-based Groth-Sahai proofs Only M is needed for signing ⇒ To request a signature on ( M , ˜ N ) , send M and a NIZKPoK π of ˜ N G ′ · ˜ �� � N ) = e ( M , ˜ G ′ ) ∧ ˜ M , ˜ : e ( G , ˜ � L User : G = 1 ˜ N G The signer produces a signature σ and a NIZK proof Ω (without knowing ˜ N ) for the validity of σ �� ( A , B , M ) , ˜ : e ( G , ˜ A ) = e ( A , ˜ � G ′ ) L Signer : A G ′ · ˜ � ∧ e ( M , ˜ A ) = e ( B , ˜ G ′ ) ∧ ˜ G = 1 ˜ G Fully re-randomizable ⇒ User verifies Ω and the final signature is a re-randomization of σ S HORT S TRUCTURE -P RESERVING S IGNATURES 17 / 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend