Galindo-Garcia Identity-Based Signature Revisited. Sanjit - - PowerPoint PPT Presentation

galindo garcia identity based signature revisited
SMART_READER_LITE
LIVE PREVIEW

Galindo-Garcia Identity-Based Signature Revisited. Sanjit - - PowerPoint PPT Presentation

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia Identity-Based Signature Revisited. Sanjit Chatterjee, Chethan Kamath and Vikas Kumar Indian Institute of Science, Bangalore November 2, 2013 Galindo-Garcia Identity-Based


slide-1
SLIDE 1

Galindo-Garcia Identity-Based Signature Revisited.

Galindo-Garcia Identity-Based Signature Revisited.

Sanjit Chatterjee, Chethan Kamath and Vikas Kumar

Indian Institute of Science, Bangalore

November 2, 2013

slide-2
SLIDE 2

Galindo-Garcia Identity-Based Signature Revisited.

Table of contents

Formal Definitions Public-Key Signature and Identity-Based Signature Security Models for PKS and IBS Galindo-Garcia IBS Salient Features Schnorr Signature and the Oracle Replay Attack Construction and Original Security Argument New Security Argument Conclusion and Future Work

slide-3
SLIDE 3

Galindo-Garcia Identity-Based Signature Revisited. Formal Definitions

FORMAL DEFINITIONS

slide-4
SLIDE 4

Galindo-Garcia Identity-Based Signature Revisited. Formal Definitions Public-Key Signature and Identity-Based Signature

Definition–Public-Key Signature

An PKS scheme consists of three PPT algorithms {K, S, V}

◮ Key Generation, K

◮ Used by the user to generate the public-private key pair

(pk, sk)

◮ pk is published and the sk kept secret ◮ Run on a security parameter κ

(pk, sk)

$

← − K(κ)

◮ Signing, S

◮ Used by the user to generate signature on some message m ◮ The secret key sk used for signing

σ

$

← − S(sk, m)

◮ Verification, V

◮ Outputs 1 if σ is a valid signature on m; else, outputs 0

b ← V(σ, m, pk)

slide-5
SLIDE 5

Galindo-Garcia Identity-Based Signature Revisited. Formal Definitions Public-Key Signature and Identity-Based Signature

Definition–Identity-Based Signature

An IBS scheme consists of four PPT algorithms {G, E, S, V}

◮ Set-up, G

◮ Used by the PKG to generate the public parameters (mpk) and

master secret (msk)

◮ mpk is published and the msk kept secret ◮ Run on a security parameter κ

(mpk, msk)

$

← − G(κ)

◮ Key Extraction, E

◮ Used by the PKG to generate the user secret key (usk) ◮ usk is then distributed through a secure channel

usk

$

← − E(id, msk)

slide-6
SLIDE 6

Galindo-Garcia Identity-Based Signature Revisited. Formal Definitions Public-Key Signature and Identity-Based Signature

Definition–Identity-Based Signature...

An IBS scheme consists of four PPT algorithms {G, E, S, V}

◮ Signing, S

◮ Used by a user with identity id to generate signature on some

message m

◮ The user secret key usk used for signing

σ

$

← − S(usk, id, m, mpk)

◮ Verification, V

◮ Outputs 1 if σ is a valid signature on m by the user with

identity id

◮ Otherwise, outputs 0

b ← V(σ, id, m, mpk)

slide-7
SLIDE 7

Galindo-Garcia Identity-Based Signature Revisited. Formal Definitions Security Models for PKS and IBS

SECURITY MODELS FOR PKS AND IBS

slide-8
SLIDE 8

Galindo-Garcia Identity-Based Signature Revisited. Formal Definitions Security Models for PKS and IBS

Security Model for PKS–EU-CMA

C

Os

EU-CMA A

pk (ˆ σ, ˆ m)

◮ Existential unforgeability under chosen-message attack

slide-9
SLIDE 9

Galindo-Garcia Identity-Based Signature Revisited. Formal Definitions Security Models for PKS and IBS

Security Model for PKS–EU-CMA

C

Os

EU-CMA A

pk (ˆ σ, ˆ m)

◮ Existential unforgeability under chosen-message attack ◮ C generates key-pair (pk, sk) and passes pk to A.

slide-10
SLIDE 10

Galindo-Garcia Identity-Based Signature Revisited. Formal Definitions Security Models for PKS and IBS

Security Model for PKS–EU-CMA

C

Os

EU-CMA A

pk (ˆ σ, ˆ m)

◮ Existential unforgeability under chosen-message attack ◮ C generates key-pair (pk, sk) and passes pk to A. ◮ Signature Queries: Access to a signing oracle Os

slide-11
SLIDE 11

Galindo-Garcia Identity-Based Signature Revisited. Formal Definitions Security Models for PKS and IBS

Security Model for PKS–EU-CMA

C

Os

EU-CMA A

pk (ˆ σ, ˆ m)

◮ Existential unforgeability under chosen-message attack ◮ C generates key-pair (pk, sk) and passes pk to A. ◮ Signature Queries: Access to a signing oracle Os ◮ Forgery: A wins if

◮ ˆ

σ is a valid signature on ˆ m.

◮ A has not made a signature query on ˆ

m.

◮ Adversary’s advantage in the game:

Pr

  • 1 ← V(ˆ

σ, ˆ m, pk) | (sk, pk)

$

← − K(κ); (ˆ σ, ˆ m)

$

← − AOs(pk)

slide-12
SLIDE 12

Galindo-Garcia Identity-Based Signature Revisited. Formal Definitions Security Models for PKS and IBS

Security Model for PKS–EU-NMA

C

Os

EU-NMA A

pk (ˆ σ, ˆ m)

◮ Existential unforgeability under no-message attack ◮ C generates key-pair (pk, sk) and passes pk to A. ◮ Signature Queries: Access to a signing oracle Os ◮ Forgery: A wins if

◮ ˆ

σ is a valid signature on ˆ m.

◮ A has not made a signature query on ˆ

m.

◮ Adversary’s advantage in the game:

Pr

  • 1 ← V(ˆ

σ, ˆ m, pk) | (sk, pk)

$

← − K(κ); (ˆ σ, ˆ m)

$

← − A(pk)

slide-13
SLIDE 13

Galindo-Garcia Identity-Based Signature Revisited. Formal Definitions Security Models for PKS and IBS

Security Model for IBS: EU-ID-CMA

C

OsOε

EU-ID-CMA A

mpk (ˆ σ, ˆ id, ˆ m)

◮ Existential unforgeability with adaptive identity under

no-message attack

slide-14
SLIDE 14

Galindo-Garcia Identity-Based Signature Revisited. Formal Definitions Security Models for PKS and IBS

Security Model for IBS: EU-ID-CMA

C

OsOε

EU-ID-CMA A

mpk (ˆ σ, ˆ id, ˆ m)

◮ Existential unforgeability with adaptive identity under

no-message attack

◮ C generates key-pair (mpk, msk) and passes mpk to A.

slide-15
SLIDE 15

Galindo-Garcia Identity-Based Signature Revisited. Formal Definitions Security Models for PKS and IBS

Security Model for IBS: EU-ID-CMA

C

OsOε

EU-ID-CMA A

mpk (ˆ σ, ˆ id, ˆ m)

◮ Existential unforgeability with adaptive identity under

no-message attack

◮ C generates key-pair (mpk, msk) and passes mpk to A. ◮ Extract Queries, Signature Queries

slide-16
SLIDE 16

Galindo-Garcia Identity-Based Signature Revisited. Formal Definitions Security Models for PKS and IBS

Security Model for IBS: EU-ID-CMA

C

OsOε

EU-ID-CMA A

mpk (ˆ σ, ˆ id, ˆ m)

◮ Existential unforgeability with adaptive identity under

no-message attack

◮ C generates key-pair (mpk, msk) and passes mpk to A. ◮ Extract Queries, Signature Queries ◮ Forgery: A wins if

◮ ˆ

σ is a valid signature on ˆ m by ˆ id.

◮ A has not made an extract query on ˆ

id.

◮ A has not made a signature query on ( ˆ

id, ˆ m).

◮ Adversary’s advantage in the game: Pr

  • 1 ← V(ˆ

σ, ˆ id, ˆ m, mpk) | (msk, mpk)

$

← − G(κ); (ˆ σ, ˆ id, ˆ m)

$

← − AO{s,ε}(mpk)

slide-17
SLIDE 17

Galindo-Garcia Identity-Based Signature Revisited. Formal Definitions Security Models for PKS and IBS

Hardness Assumption: Discrete-log Assumption

Discrete-log problem for a group G = g and |G| = p C

DLP

A

DLP (G, g, p, gα) α

slide-18
SLIDE 18

Galindo-Garcia Identity-Based Signature Revisited. Formal Definitions Security Models for PKS and IBS

Hardness Assumption: Discrete-log Assumption

Discrete-log problem for a group G = g and |G| = p C

DLP

A

DLP (G, g, p, gα) α

  • Definition. The DLP in G is to find α given gα, where α ∈R Zp.

An adversary A has advantage ǫ in solving the DLP if Pr

  • α′ = α | α ∈R Zp; α′ ← A(G, p, g, gα)
  • ≥ ǫ.

The (ǫ, t)-discrete-log assumption holds in G if no adversary has advantage at least ǫ in solving the DLP in time at most t.

slide-19
SLIDE 19

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS

GALINDO-GARCIA IBS

slide-20
SLIDE 20

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Salient Features

Galindo-Garcia IBS - Salient Features

◮ Derived from Schnorr signature scheme ◮ Based on the discrete-log assumption ◮ Efficient, simple and does not use pairing ◮ Security argued using oracle replay attacks ◮ Uses the random oracle heuristic

slide-21
SLIDE 21

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Schnorr Signature and the Oracle Replay Attack

SCHNORR SIGNATURE AND THE ORACLE REPLAY ATTACK

slide-22
SLIDE 22

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Schnorr Signature and the Oracle Replay Attack

Schnorr Signature

The Setting.

  • 1. We work in group G = g of prime order p.
  • 2. A hash function H : {0, 1}∗ → Zp is used.

Key Generation. K(κ):

  • 1. Select z ∈R Zp as the secret key sk
  • 2. Set Z := g z as the public key pk
  • Signing. S(m, sk):
  • 1. Let sk = z. Select r ∈R Zp, set R := g r and c := H(m, R).
  • 2. The signature on m is σ := (y, R) where

y := r + zc

  • Verification. V(σ, m):
  • 1. Let σ = (y, R) and c = H(m, R).
  • 2. σ is valid if

g y = RZ c

slide-23
SLIDE 23

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Schnorr Signature and the Oracle Replay Attack

Security of Schnorr Signature–An Intuition

◮ Consider an adversary A with ability to launch

chosen-message attack on the Schnorr signature scheme.

◮ Let {σ0, . . . , σn−1} with σi = (yi = ri + zci, Ri) on mi be the

signatures that A receives.           1 · · · c0 1 · · · c1 . . . . . . ... . . . . . . · · · 1 cn−1           ×               r0 r1 . . . rn−1 z               =           y0 y1 . . . rn−1          

slide-24
SLIDE 24

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Schnorr Signature and the Oracle Replay Attack

Security of Schnorr Signature–An Intuition...

◮ However, A can solve for x if it gets two equations containing

the same r but different c, i.e. y = r + zc and ¯ y = r + z¯ c implies z = y − ¯ y c − ¯ c Π

slide-25
SLIDE 25

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Schnorr Signature and the Oracle Replay Attack

The Oracle Replay Attack

◮ Random oracle H–ith random oracle query Q0 i replied with s0 i .

C

H

Π A Π Q0

i

s0

i

Π

H

Tape re-wound to Q0

I

Simulation in round 1 from Q0

I using a different random

function

Q0

I+1

Q0

γ

round 0 Q0

1

Q0

2

Q0

I

Q1

I+1

Q1

γ

round 1 s0

1

s0

I

s1

I

s0

γ

s1

γ

slide-26
SLIDE 26

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Schnorr Signature and the Oracle Replay Attack

The Oracle Replay Attack

◮ Random oracle H–ith random oracle query Q0 i replied with s0 i .

C

H

Π A Π Q0

i

s0

i

Π

H

  • 1. Tape re-wound to Q0

I

Simulation in round 1 from Q0

I using a different random

function

Q0

I+1

Q0

γ

round 0 Q0

1

Q0

2

Q0

I

Q1

I+1

Q1

γ

round 1 s0

1

s0

I

s1

I

s0

γ

s1

γ

slide-27
SLIDE 27

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Schnorr Signature and the Oracle Replay Attack

The Oracle Replay Attack

◮ Random oracle H–ith random oracle query Q0 i replied with s0 i .

C

H

Π A Π Q0

i

s0

i

Π

H

  • 1. Tape re-wound to Q0

I

  • 2. Simulation in round 1 from Q0

I using a different random

function

Q0

I+1

Q0

γ

round 0 Q0

1

Q0

2

Q0

I

Q1

I+1

Q1

γ

round 1 s0

1

s0

I

s1

I

s0

γ

s1

γ

slide-28
SLIDE 28

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Schnorr Signature and the Oracle Replay Attack

Proving Security of Schnorr Signature using ORA

B

DLP

C

DLP SS H

A

SS

∆ = (G, g, p, g α) α pk := ∆ EU-NMA ˆ σ = (y, R, ˆ m)

Q0

I+1

Q0

γ

ˆ σ0 = (y = r + αc, R) Q0

1

Q0

2

Q0

I : H( ˆ

m, R) Q1

I+1

Q1

γ

ˆ σ1 = (¯ y = r + α¯ c, R) c ¯ c

α = y0 − y1 c − ¯ c

slide-29
SLIDE 29

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Schnorr Signature and the Oracle Replay Attack

Forking Lemma

◮ The oracle replay attack formalised through the forking

algorithm

◮ The forking lemma gives a lower bound on the success

probability of the oracle replay attack (frk) in terms of the success probability of the adversary during a particular run (acc)

slide-30
SLIDE 30

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Schnorr Signature and the Oracle Replay Attack

Forking Lemma

◮ The oracle replay attack formalised through the forking

algorithm

◮ The forking lemma gives a lower bound on the success

probability of the oracle replay attack (frk) in terms of the success probability of the adversary during a particular run (acc)

◮ Types of forking algorithms

Forking Algorithm #Oracles #Replay Attacks Success Prob. (≈) GF–General Forking - FW 1 1 (i.e. 2 runs)

acc2 γ

MF–Multiple-Forking(n) - MW ,n 2 2n-1 (i.e. 2n runs)

accn γ2n

γ–Upper bound on the number of oracle queries

slide-31
SLIDE 31

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Schnorr Signature and the Oracle Replay Attack

Forking Lemma...

E.g. Multiple-forking algorithm for n = 3.

Q0

I0+1

Q0

γ

σ [round 0] Q0

J0+1

Q0

I0

Q1

I0+1

Q1

γ

σ1 [round 1] Q0

1

Q0

2

Q0

J0

Q2

I0+1

Q2

γ

σ2 [round 2] Q2

J0+1

Q2

I0

Q3

I0+1

Q3

γ

σ3 [round 3] s0

J0

s2

J0

s0

I0

s1

I0

s2

I0

s3

I0

slide-32
SLIDE 32

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Construction and Original Security Argument

GALINDO-GARCIA IBS–CONSTRUCTION

slide-33
SLIDE 33

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Construction and Original Security Argument

The Construction

Set-up. G(κ):

  • 1. Let G = g be a group of prime order p.
  • 2. Return z ∈R Zp as msk and (G, p, g, g z, H, G) as mpk, where

H and G are hash functions H : {0, 1}∗ → Zp and G : {0, 1}∗ → Zp.

slide-34
SLIDE 34

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Construction and Original Security Argument

The Construction

Set-up. G(κ):

  • 1. Let G = g be a group of prime order p.
  • 2. Return z ∈R Zp as msk and (G, p, g, g z, H, G) as mpk, where

H and G are hash functions H : {0, 1}∗ → Zp and G : {0, 1}∗ → Zp.

Key Extraction. E(id, msk, mpk):

  • 1. Select r ∈R Zp and set R := g r.
  • 2. Return usk := (y, R) as usk, where

y := r + zc and c := H(R, id).

slide-35
SLIDE 35

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Construction and Original Security Argument

The Construction

Set-up. G(κ):

  • 1. Let G = g be a group of prime order p.
  • 2. Return z ∈R Zp as msk and (G, p, g, g z, H, G) as mpk, where

H and G are hash functions H : {0, 1}∗ → Zp and G : {0, 1}∗ → Zp.

Key Extraction. E(id, msk, mpk):

  • 1. Select r ∈R Zp and set R := g r.
  • 2. Return usk := (y, R) as usk, where

y := r + zc and c := H(R, id).

  • Signing. S(id, m, usk, mpk):
  • 1. Let usk = (y, R). Select a ∈R Zp and set A := g a.
  • 2. Return σ := (A, b, R) as the signature, where

b := a + yd and d := G(id, A, m).

slide-36
SLIDE 36

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Construction and Original Security Argument

The Construction

  • Verification. V(σ, id, m, mpk):
  • 1. Let σ = (A, b, R), c := H(R, id) and d := G(id, A, m).
  • 2. The signature is valid if

g b = A(R · (g z)c)d.

slide-37
SLIDE 37

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Construction and Original Security Argument

ORIGINAL SECURITY ARGUMENT

slide-38
SLIDE 38

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Construction and Original Security Argument

Original Security Argument

◮ Let ˆ

σ = (b, A, R) be the forgery produced by A on ( ˆ id, ˆ m). U E ¯ E B1 B2 E: Event that A forges using the same randomiser R as given by C as part of signature query on ˆ id.

slide-39
SLIDE 39

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Construction and Original Security Argument

Original Security Argument

◮ Let ˆ

σ = (b, A, R) be the forgery produced by A on ( ˆ id, ˆ m). U E ¯ E B1 B2 E: Event that A forges using the same randomiser R as given by C as part of signature query on ˆ id.

◮ In both B1 and B2, solving DLP is reduced to breaking the

IBS.

slide-40
SLIDE 40

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS Construction and Original Security Argument

In a Nutshell

Reduction Success Prob. (≈) Forking Used B1

ǫ2 q3

G

General Forking–FW B2

ǫ4 (qHqG)6

Multiple-Forking–MW,3

slide-41
SLIDE 41

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS New Security Argument

Our Contribution

◮ We found several problems with B1 and B2

  • 1. B1: Fails in the standard security model for IBS
  • 2. B2: All the adversarial strategies were not covered
slide-42
SLIDE 42

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS New Security Argument

Our Contribution

◮ We found several problems with B1 and B2

  • 1. B1: Fails in the standard security model for IBS
  • 2. B2: All the adversarial strategies were not covered

◮ The adversary is able to distinguish a simulation from the real

execution of the protocol.

slide-43
SLIDE 43

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS New Security Argument

Our Contribution

◮ We found several problems with B1 and B2

  • 1. B1: Fails in the standard security model for IBS
  • 2. B2: All the adversarial strategies were not covered

◮ The adversary is able to distinguish a simulation from the real

execution of the protocol.

◮ Positive contribution:

  • 1. We give a detailed new security argument
  • 2. Tighter than the original security argument
slide-44
SLIDE 44

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS New Security Argument

NEW SECURITY ARGUMENT

slide-45
SLIDE 45

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS New Security Argument

New Security Argument

◮ Let ˆ

σ = (b, A, R) be the forgery produced by A on ( ˆ id, ˆ m).

slide-46
SLIDE 46

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS New Security Argument

New Security Argument

◮ Let ˆ

σ = (b, A, R) be the forgery produced by A on ( ˆ id, ˆ m). U E ¯ E R1 F ¯ F R2 R3 F: Event that A calls G( ˆ id, A, ˆ m) before H(R, ˆ id).

slide-47
SLIDE 47

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS New Security Argument

New Security Argument

◮ Let ˆ

σ = (b, A, R) be the forgery produced by A on ( ˆ id, ˆ m). U E ¯ E R1 F ¯ F R2 R3 F: Event that A calls G( ˆ id, A, ˆ m) before H(R, ˆ id).

  • 1. Problems with B1 addressed in R1
  • 2. R2 covers the unaddressed adversarial strategy in B2
  • 3. R3 same as the original reduction B2
slide-48
SLIDE 48

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS New Security Argument

Reduction R1

C

DLP

R1

DLP GG OsOεHG

A

GG

∆ = (G, g, p, g α) α mpk := (G, g, p, g z) EU-CMA ˆ σ = (g a, b, g r)

Q0

I+1

Q0

γ

ˆ σ0 = (g a, b = a + (α + c0z)d, g α) Q0

1

Q0

2

G( ˆ id, g a, ˆ m) Q1

I+1

Q1

γ

ˆ σ1 = (g a, ¯ b = a + (α + c1z)¯ d, g α) d ¯ d

◮ Problem instance plugged in the randomiser R (as in B1)

slide-49
SLIDE 49

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS New Security Argument

Reduction R1

C

DLP

R1

DLP GG OsOεHG

A

GG

∆ = (G, g, p, g α) α mpk := (G, g, p, g z) EU-CMA ˆ σ = (g a, b, g r)

Q0

I+1

Q0

γ

ˆ σ0 = (g a, b = a + (α + c0z)d, g α) Q0

1

Q0

2

G( ˆ id, g a, ˆ m) Q1

I+1

Q1

γ

ˆ σ1 = (g a, ¯ b = a + (α + c1z)¯ d, g α) d ¯ d

◮ Problem instance plugged in the randomiser R (as in B1) ◮ Coron’s technique used to assign target identities (instead of

guessing) – security degradation reduced to O (qε)

◮ Signature Query. Os(id, m) –

◮ Toss a biased coin β

slide-50
SLIDE 50

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS New Security Argument

Reduction R1

C

DLP

R1

DLP GG OsOεHG

A

GG

∆ = (G, g, p, g α) α mpk := (G, g, p, g z) EU-CMA ˆ σ = (g a, b, g r)

Q0

I+1

Q0

γ

ˆ σ0 = (g a, b = a + (α + c0z)d, g α) Q0

1

Q0

2

G( ˆ id, g a, ˆ m) Q1

I+1

Q1

γ

ˆ σ1 = (g a, ¯ b = a + (α + c1z)¯ d, g α) d ¯ d

◮ Problem instance plugged in the randomiser R (as in B1) ◮ Coron’s technique used to assign target identities (instead of

guessing) – security degradation reduced to O (qε)

◮ Signature Query. Os(id, m) –

◮ Toss a biased coin β

  • 1. If β = 0, signature given with randomiser R containing g α
  • 2. Else, R1 uses knowledge of msk to generate user private key

for id and then computes signature using S

slide-51
SLIDE 51

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS New Security Argument

Reduction R1

C

DLP

R1

DLP GG OsOεHG

A

GG

∆ = (G, g, p, g α) α mpk := (G, g, p, g z) EU-CMA ˆ σ = (g a, b, g r)

Q0

I+1

Q0

γ

ˆ σ0 = (g a, b = a + (α + c0z)d, g α) Q0

1

Q0

2

G( ˆ id, g a, ˆ m) Q1

I+1

Q1

γ

ˆ σ1 = (g a, ¯ b = a + (α + c1z)¯ d, g α) d ¯ d

◮ Problem instance plugged in the randomiser R (as in B1) ◮ Coron’s technique used to assign target identities (instead of

guessing) – security degradation reduced to O (qε)

◮ Signature Query. Os(id, m) –

◮ Toss a biased coin β

  • 1. If β = 0, signature given with randomiser R containing g α
  • 2. Else, R1 uses knowledge of msk to generate user private key

for id and then computes signature using S

◮ General forking algorithm (FW ) used to solve DLP (as in B1)

slide-52
SLIDE 52

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS New Security Argument

Reduction R1

C

DLP

R1

DLP GG OsOεHG

A

GG

∆ = (G, g, p, g α) α mpk := (G, g, p, g z) EU-CMA ˆ σ = (g a, b, g r)

Problem instance plugged in the randomiser R (as in B1) Coron’s technique used to assign target identities (instead of guessing) – security degradation reduced to O (qε) Signature Query. Os(id, m) –

Toss a biased coin β

If β = 0, signature given with randomiser R containing g α Else, R1 uses knowledge of msk to generate user private key for id and then computes signature using S

General forking algorithm (FW ) used to solve DLP (as in B1)

Q0

I+1

Q0

γ

ˆ σ0 = (g a, b = a + (α + c0z)d, g α) Q0

1

Q0

2

G( ˆ id, g a, ˆ m) Q1

I+1

Q1

γ

ˆ σ1 = (g a, ¯ b = a + (α + c1z)¯ d, g α) d ¯ d

slide-53
SLIDE 53

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS New Security Argument

Reduction R2

C

DLP

R2

DLP GG OsOεHG

A

GG

∆ = (G, g, p, g α) α mpk := (G, g, p, g z) EU-CMA ˆ σ = (g a, b, g r)

◮ Problem instance plugged in the public key pk (as in B2) ◮ Signature queries are handled as in B2 ◮ However, Multiple-forking with n = 1 (MW,1) used to solve

the DLP

◮ Hence, tighter than B2

slide-54
SLIDE 54

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS New Security Argument

Reduction R2

C

DLP

R2

DLP GG OsOεHG

A

GG

∆ = (G, g, p, g α) α mpk := (G, g, p, g z) EU-CMA ˆ σ = (g a, b, g r)

Problem instance plugged in the public key pk (as in B2) Signature queries are handled as in B2 However, Multiple-forking with n = 1 (MW,1) used to solve the DLP Hence,tighter than B2

Q0

I0+1

Q0

γ

ˆ σ0 = (g a, b = a + (r + αc)d, g r ) Q0

1

Q0

2

G( ˆ id, g a, ˆ m) Q0

J0+1

H( ˆ id, g r) Q1

I0+1

Q1

γ

ˆ σ1 = (g a, ¯ b = a + (r + α¯ c)d, g r ) d c ¯ c

slide-55
SLIDE 55

Galindo-Garcia Identity-Based Signature Revisited. Galindo-Garcia IBS New Security Argument

In a Nutshell

Reduction Success Prob. (≈) Forking Used R1

ǫ2 qGqε

FW R2

ǫ2 (qH+qG)2

MW,1 R3

ǫ4 (qH+qG)6

MW,3

slide-56
SLIDE 56

Galindo-Garcia Identity-Based Signature Revisited. Conclusion and Future Work

Conclusion and Future Work

We revisited the Galindo-Garcia IBS security argument

◮ Analysed the original security proof; fixed ambiguities ◮ Provided an improved security proof

Future Work

◮ Replacing the ‘costly’ multiple-forking for even tighter

reductions–dependent random oracles.

slide-57
SLIDE 57

Galindo-Garcia Identity-Based Signature Revisited. Conclusion and Future Work

THANK YOU!