hard to compute bits for elliptic curve based one way
play

Hard-to-Compute Bits for Elliptic Curve-Based One-Way Functions - PowerPoint PPT Presentation

Hard-to-Compute Bits for Elliptic Curve-Based One-Way Functions Alexandre Duc 1 Dimitar Jetchev 1 1 EPFL, Switzerland Crypto2012, August 23rd, 2012, Santa Barbara, CA Alexandre Duc , Dimitar Jetchev Security of Individual Bits Alexandre Duc


  1. Hard-to-Compute Bits for Elliptic Curve-Based One-Way Functions Alexandre Duc 1 Dimitar Jetchev 1 1 EPFL, Switzerland Crypto’2012, August 23rd, 2012, Santa Barbara, CA Alexandre Duc , Dimitar Jetchev

  2. Security of Individual Bits Alexandre Duc , Dimitar Jetchev

  3. Pairing-based One-Way and FAPI-2 E / F p - elliptic curve ( p is a prime), Alexandre Duc , Dimitar Jetchev

  4. Pairing-based One-Way and FAPI-2 E / F p - elliptic curve ( p is a prime), G - a large cyclic subgroup of points on E , Alexandre Duc , Dimitar Jetchev

  5. Pairing-based One-Way and FAPI-2 E / F p - elliptic curve ( p is a prime), G - a large cyclic subgroup of points on E , e : G × G → G T - a cryptographic pairing, Alexandre Duc , Dimitar Jetchev

  6. Pairing-based One-Way and FAPI-2 E / F p - elliptic curve ( p is a prime), G - a large cyclic subgroup of points on E , e : G × G → G T - a cryptographic pairing, By fixing the second argument, one gets f Q : G → G T , f Q ( • ) = e ( • , Q ) Alexandre Duc , Dimitar Jetchev

  7. Pairing-based One-Way and FAPI-2 E / F p - elliptic curve ( p is a prime), G - a large cyclic subgroup of points on E , e : G × G → G T - a cryptographic pairing, By fixing the second argument, one gets f Q : G → G T , f Q ( • ) = e ( • , Q ) FAPI-2 problem is the problem of inverting this function Alexandre Duc , Dimitar Jetchev

  8. Why is FAPI-2 relevant? The security of the following schemes relies on the hardness of solving FAPI-2: Alexandre Duc , Dimitar Jetchev

  9. Why is FAPI-2 relevant? The security of the following schemes relies on the hardness of solving FAPI-2: Boneh–Franklin: identity-based encryption scheme Alexandre Duc , Dimitar Jetchev

  10. Why is FAPI-2 relevant? The security of the following schemes relies on the hardness of solving FAPI-2: Boneh–Franklin: identity-based encryption scheme Joux: three-party one-round key agreement protocol Alexandre Duc , Dimitar Jetchev

  11. Why is FAPI-2 relevant? The security of the following schemes relies on the hardness of solving FAPI-2: Boneh–Franklin: identity-based encryption scheme Joux: three-party one-round key agreement protocol Hess: identity-based signature scheme Alexandre Duc , Dimitar Jetchev

  12. Why is FAPI-2 relevant? The security of the following schemes relies on the hardness of solving FAPI-2: Boneh–Franklin: identity-based encryption scheme Joux: three-party one-round key agreement protocol Hess: identity-based signature scheme FAPI-2 is Hard! Solving FAPI-1 and FAPI-2 yields a solution to CDH. Alexandre Duc , Dimitar Jetchev

  13. Why is FAPI-2 relevant? The security of the following schemes relies on the hardness of solving FAPI-2: Boneh–Franklin: identity-based encryption scheme Joux: three-party one-round key agreement protocol Hess: identity-based signature scheme FAPI-2 is Hard! Solving FAPI-1 and FAPI-2 yields a solution to CDH. Our Contribution Assuming the hardness of FAPI-2, we show that all the bits of the input to the pairing-based one-way function are secure. Alexandre Duc , Dimitar Jetchev

  14. Elliptic Curves, Weierstrass Equations, Isomorphism Classes (Short) Weierstrass Equations Equations E a , b : y 2 = x 3 + ax + b , a , b ∈ F p , 4 a 3 + 27 b 2 � = 0. Alexandre Duc , Dimitar Jetchev

  15. Elliptic Curves, Weierstrass Equations, Isomorphism Classes (Short) Weierstrass Equations Equations E a , b : y 2 = x 3 + ax + b , a , b ∈ F p , 4 a 3 + 27 b 2 � = 0. Two Weierstrass equations might represent isomorphic curves. Alexandre Duc , Dimitar Jetchev

  16. Elliptic Curves, Weierstrass Equations, Isomorphism Classes (Short) Weierstrass Equations Equations E a , b : y 2 = x 3 + ax + b , a , b ∈ F p , 4 a 3 + 27 b 2 � = 0. Two Weierstrass equations might represent isomorphic curves. Isomorphism classes Two elliptic curves E a , b and E a ′ , b ′ are isomorphic (over F p ) if and only if a ′ = λ − 4 a , b ′ = λ − 6 b for some λ ∈ F × p . The isomorphism between E a , b and E a ′ , b ′ is given by ( x , y ) �→ ( λ 2 x , λ 3 y ) . Alexandre Duc , Dimitar Jetchev

  17. Elliptic Curves, Weierstrass Equations, Isomorphism Classes (Short) Weierstrass Equations Equations E a , b : y 2 = x 3 + ax + b , a , b ∈ F p , 4 a 3 + 27 b 2 � = 0. Two Weierstrass equations might represent isomorphic curves. Isomorphism classes Two elliptic curves E a , b and E a ′ , b ′ are isomorphic (over F p ) if and only if a ′ = λ − 4 a , b ′ = λ − 6 b for some λ ∈ F × p . The isomorphism between E a , b and E a ′ , b ′ is given by ( x , y ) �→ ( λ 2 x , λ 3 y ) . Each isomorphism class thus contains precisely p − 1 short Weierstrass equations. Alexandre Duc , Dimitar Jetchev

  18. The main result All bits of the pairing-based OWF are hard-to-compute If there is an oracle that predicts the k th bit of the input to f Q on a significant fraction of all short Weierstrass equations in an isomorphism class then there is an efficient algorithm to invert f Q . Alexandre Duc , Dimitar Jetchev

  19. The main result All bits of the pairing-based OWF are hard-to-compute If there is an oracle that predicts the k th bit of the input to f Q on a significant fraction of all short Weierstrass equations in an isomorphism class then there is an efficient algorithm to invert f Q . Conclusion Thus, if FAPI-2 is hard, all the bits of the input of the pairing-based OWF are hard-to-compute. Alexandre Duc , Dimitar Jetchev

  20. Elliptic Curve-Based OWFs The result is in fact much more general as few properties of the pairing-based function f Q are used. Alexandre Duc , Dimitar Jetchev

  21. Elliptic Curve-Based OWFs The result is in fact much more general as few properties of the pairing-based function f Q are used. Bit Security for EC-based OWFs Let G be an elliptic curve group and f : G → G T be any function with the property that its definition is independent of the choice of short Weierstrass equation in the isomorphism class (e.g., the pairing-based OWF). Assuming that inverting f is hard, every bit of the input to f is secure. Alexandre Duc , Dimitar Jetchev

  22. Elliptic Curve-Based OWFs The result is in fact much more general as few properties of the pairing-based function f Q are used. Bit Security for EC-based OWFs Let G be an elliptic curve group and f : G → G T be any function with the property that its definition is independent of the choice of short Weierstrass equation in the isomorphism class (e.g., the pairing-based OWF). Assuming that inverting f is hard, every bit of the input to f is secure. Open Question: Are there other cryptographically interesting EC-based OWFs besides the pairing-based functions for which this result could apply? Alexandre Duc , Dimitar Jetchev

  23. Outline of the Method Define a code - elliptic curve multiplication code (ECMC), Alexandre Duc , Dimitar Jetchev

  24. Outline of the Method Define a code - elliptic curve multiplication code (ECMC), Codewords are in bijection with the inputs to the OWF, Alexandre Duc , Dimitar Jetchev

  25. Outline of the Method Define a code - elliptic curve multiplication code (ECMC), Codewords are in bijection with the inputs to the OWF, Use oracle to get a noisy codeword close to the hidden input, Alexandre Duc , Dimitar Jetchev

  26. Outline of the Method Define a code - elliptic curve multiplication code (ECMC), Codewords are in bijection with the inputs to the OWF, Use oracle to get a noisy codeword close to the hidden input, Inverting the function ⇔ list-decoding, Alexandre Duc , Dimitar Jetchev

  27. Outline of the Method Define a code - elliptic curve multiplication code (ECMC), Codewords are in bijection with the inputs to the OWF, Use oracle to get a noisy codeword close to the hidden input, Inverting the function ⇔ list-decoding, List-decoding via Fourier transforms: Alexandre Duc , Dimitar Jetchev

  28. Outline of the Method Define a code - elliptic curve multiplication code (ECMC), Codewords are in bijection with the inputs to the OWF, Use oracle to get a noisy codeword close to the hidden input, Inverting the function ⇔ list-decoding, List-decoding via Fourier transforms: Codewords viewed as functions on F × p , Alexandre Duc , Dimitar Jetchev

  29. Outline of the Method Define a code - elliptic curve multiplication code (ECMC), Codewords are in bijection with the inputs to the OWF, Use oracle to get a noisy codeword close to the hidden input, Inverting the function ⇔ list-decoding, List-decoding via Fourier transforms: Codewords viewed as functions on F × p , Heavy Fourier coefficients: computation of heavy Fourier coefficients (a version of the SFT algorithm by Akavia–Goldwasser–Safra) Alexandre Duc , Dimitar Jetchev

  30. Outline of the Method Define a code - elliptic curve multiplication code (ECMC), Codewords are in bijection with the inputs to the OWF, Use oracle to get a noisy codeword close to the hidden input, Inverting the function ⇔ list-decoding, List-decoding via Fourier transforms: Codewords viewed as functions on F × p , Heavy Fourier coefficients: computation of heavy Fourier coefficients (a version of the SFT algorithm by Akavia–Goldwasser–Safra) Recoverability: for a given frequency, find all inputs having large Fourier coefficient at this frequency (a technique of Morillo–R` afols). Alexandre Duc , Dimitar Jetchev

  31. Using the prediction oracle - na¨ ıve idea! Suppose that we are given Alexandre Duc , Dimitar Jetchev

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend