HMFEv - An Efficient Multivariate Signature Scheme Albrecht - - PowerPoint PPT Presentation

hmfev an efficient multivariate signature scheme
SMART_READER_LITE
LIVE PREVIEW

HMFEv - An Efficient Multivariate Signature Scheme Albrecht - - PowerPoint PPT Presentation

HMFEv - An Efficient Multivariate Signature Scheme Albrecht Petzoldt, Ming-Shing Chen, Jintai Ding, Bo-Yin Yang PQCrypto 2017 Utrecht, Netherlands A. Petzoldt HMFEv PQCrypto 2017 1 / 23 Outline Multivariate Cryptography 1 The HMFEv


slide-1
SLIDE 1

HMFEv - An Efficient Multivariate Signature Scheme

Albrecht Petzoldt, Ming-Shing Chen, Jintai Ding, Bo-Yin Yang PQCrypto 2017 Utrecht, Netherlands

  • A. Petzoldt

HMFEv PQCrypto 2017 1 / 23

slide-2
SLIDE 2

Outline

1

Multivariate Cryptography

2

The HMFEv Signature Scheme

3

Security

4

Parameters and Key Sizes

5

Efficiency and Comparison

6

Conclusion

  • A. Petzoldt

HMFEv PQCrypto 2017 2 / 23

slide-3
SLIDE 3

Multivariate Cryptography

p(1)(x1, . . . , xn) =

n

  • i=1

n

  • j=i

p(1)

ij

· xixj +

n

  • i=1

p(1)

i

· xi + p(1) p(2)(x1, . . . , xn) =

n

  • i=1

n

  • j=i

p(2)

ij

· xixj +

n

  • i=1

p(2)

i

· xi + p(2) . . . p(m)(x1, . . . , xn) =

n

  • i=1

n

  • j=i

p(m)

ij

· xixj +

n

  • i=1

p(m)

i

· xi + p(m) The security of multivariate schemes is based on the Problem MQ: Given m multivariate quadratic polynomials p(1)(x), . . . , p(m)(x), find a vector ¯ x = (¯ x1, . . . , ¯ xn) such that p(1)(¯ x) = . . . = p(m)(¯ x) = 0.

  • A. Petzoldt

HMFEv PQCrypto 2017 3 / 23

slide-4
SLIDE 4

Construction

Easily invertible quadratic map F : Fn → Fm Two invertible linear maps S : Fm → Fm and T : Fn → Fn Public key: P = S ◦ F ◦ T supposed to look like a random system Private key: S, F, T allows to invert the public key

  • A. Petzoldt

HMFEv PQCrypto 2017 4 / 23

slide-5
SLIDE 5

Workflow

Decryption / Signature Generation w ∈ Fm

S−1 x ∈ Fm

F−1 y ∈ Fn

T −1 z ∈ Fn

P Encryption / Signature Verification

  • A. Petzoldt

HMFEv PQCrypto 2017 5 / 23

slide-6
SLIDE 6

Multivariate Signature Schemes

Multivariate Signature Schemes

Single Field Schemes

  • UOV
  • Rainbow

Big Field Schemes

  • HFEv-

❅ ❅ ❅ ❅

  • A. Petzoldt

HMFEv PQCrypto 2017 6 / 23

slide-7
SLIDE 7

Multivariate Signature Schemes

Multivariate Signature Schemes

Single Field Schemes

  • UOV
  • Rainbow

Big Field Schemes

  • HFEv-

❅ ❅ ❅ ❅

  • A. Petzoldt

HMFEv PQCrypto 2017 7 / 23

slide-8
SLIDE 8

HFEv-

uses HFE polynomial F of degree D signature generation: invert F by Berlekamps algorithm (complexity ∼ D3) Efficiency: Use small D Security: r = ⌊logq(D − 1)⌋ + 1 should not be too small ⇒ Use HFEv- over small fields, e.g. F=GF(2) ⇒ many equations and variables required to defend against (quantum) brute force attacks ⇒ large key sizes, hard to scale to higher security levels ⇒ Can we create HFEv- like schemes over large fields?

  • A. Petzoldt

HMFEv PQCrypto 2017 8 / 23

slide-9
SLIDE 9

Medium Field Signature Schemes

Signature Generation w ∈ Fn

✲ x ∈ Fn ✲ y ∈ Fn ✲ z ∈ Fn ✻

P S−1 ¯ F−1 T −1 Signature Verification X ∈ Ek Y ∈ Ek

F−1

φ × · · · × φ

  • k−times

φ−1 × . . . φ−1

  • k−times
  • A. Petzoldt

HMFEv PQCrypto 2017 9 / 23

slide-10
SLIDE 10

HMFEv - Key Generation

finite field F, integers k, ℓ, v, extension field E of degree ℓ, isomorphism φ : Fℓ → E, m = k · ℓ, n = m + v central map F: k components f (1), . . . , f (k) : Ek × Fv → E,

f (i)(X1, . . . , Xk) =

k

  • r,s=1

α(i)

r,sXrXs + k

  • r=1

β(i)

r (v1, . . . , vv) · Xr + γ(i)(v1, . . . , vv)

with β(i)

r

: Fv → E linear, γ(i) : Fv → E quadratic ⇒ ¯ F = (φ−1 × · · · × φ−1) ◦ F ◦ (φ × · · · × φ × idv) : Fn → Fm quadratic two invertible affine transformations S : Fm → Fm, T : Fn → Fn public key: P = S ◦ ¯ F ◦ T : Fn → Fm private key: S, F, T

  • A. Petzoldt

HMFEv PQCrypto 2017 10 / 23

slide-11
SLIDE 11

Signature Generation

Given: document d

1 use hash function H : {0, 1}⋆ → Fm to compute w = H(d) ∈ Fm 2 Compute x = S−1(w) ∈ Fm and

Xi = φ(x(i−1)·ℓ+1, . . . , xi·ℓ) ∈ E (i = 1, . . . , k).

3 Choose random values for the vinegar variables v1, . . . , vv

Solve the multivariate quadratic system f (i)

v1,...,vv(Y1, . . . , Yk) = Xi (i = 1, . . . , k) by XL or a Gr¨

  • bner basis

algorithm

4 Compute y = (φ−1(Y1), . . . , φ−1(Yk), v1, . . . , vv) ∈ Fn 5 Compute the signature z ∈ Fn by z = T −1(y)

  • A. Petzoldt

HMFEv PQCrypto 2017 11 / 23

slide-12
SLIDE 12

Signature Verification

Given: signature z ∈ Fn, message d Compute w = P(d) ∈ Fm Compute w′ = P(z) ∈ Fm Accept the signature z ⇔ w′ = w.

  • A. Petzoldt

HMFEv PQCrypto 2017 12 / 23

slide-13
SLIDE 13

Security

Min Rank attack

Theorem

If v ≤ ℓ holds, the rank of the quadratic form associated to F(i) is less or equal to k + v Vinegar maps are chosen completely random ⇒ upper bound is tight ComplexityMinRank = ℓ(k+v+1)·ω with 2 < ω ≤ 3.

  • A. Petzoldt

HMFEv PQCrypto 2017 13 / 23

slide-14
SLIDE 14

Direct attack

Theorem

The degree of regularity of a direct attack against an HMFEv system is, under the assumption of v ≤ ℓ bounded by dreg ≤

(q−1)·(k+v−1)

2

for q even and k + v odd

(q−1)·(k+v) 2

  • therwise.

Experiments over small fields ⇒ bound is relativelty tight ⇒ concrete choice of k and v is not important, as long as k + v is fixed and k, v ≥ 2

  • A. Petzoldt

HMFEv PQCrypto 2017 14 / 23

slide-15
SLIDE 15

Direct attacks (2)

Experiments over large fields

GF(31) parameters (k, ℓ, v) (2,6,4) (2,7,4) (2,8,4) random m,n 12,12 14,14 16,16 16,16 dreg 14 16 18 18 time (s) 1,911 164,089

  • memory (MB)

953 17,273

  • oM
  • oM

GF(256) parameters (k, ℓ, v) (3,3,6) (3,4,6) (3,5,6) random m,n 9,9 12,12 15,15 15,15 dreg 11 14 17 17 time (s) 3.9 1,853

  • memory (MB)

23.7 952

  • oM
  • oM

⇒ we can reach high values of dreg ⇒ HMFEv systems behave very similar to random systems ComplexityDirect = 3 ·

  • n + dreg

dreg

2

·

  • n

2

  • .
  • A. Petzoldt

HMFEv PQCrypto 2017 15 / 23

slide-16
SLIDE 16

Quantum Attacks

With the help of Grover’s algorithm, a binary multivariate system with n variables can be solved using 2(n/2) · 2 · n3 operations ⇒ large impact on multivariate schemes over small fields (e.g. HFEv-) ⇒ no significant impact on multivariate schemes over large fields (e.g. HMFE)

  • A. Petzoldt

HMFEv PQCrypto 2017 16 / 23

slide-17
SLIDE 17

Parameter Choice

How to choose the parameter k? Efficiency: Choose k as small as possible Security: too small k might make the scheme insecure ⇒ odd q: choose k = 2, choose the coefficients of f (1) and f (2) such that p(X) = det(F1 + X · F2) is irreducible ⇒ even q: choose k = 3

  • A. Petzoldt

HMFEv PQCrypto 2017 17 / 23

slide-18
SLIDE 18

Key Sizes and Comparison

quantum security

public key private key signature

level (bit)

size (kB) size (kB) size (bit) 80 Rainbow (GF(256),17,13,13) 25.1 19.9 344 Gui (GF(2),120,9,3,3,2) 110.7 3.8 129 HMFEv (GF(31),2,18,8) 22.5 3.5 218 HMFEv (GF(256),3,9,12) 21.6 6.0 312 128 Rainbow (GF(256),36,21,22) 136.0 102.5 632 Gui (GF(2),212,9,3,4,2) 592.8 11.6 222 HMFEv (GF(31),2,28,12) 81.8 8.9 337 HMFEv (GF(256),3,15,16) 85.8 15.2 488 256 Rainbow (GF(256),86,45,46) 1,415.7 1,046.3 1,416 Gui (GF(2),464,9,7,8,2) 6,253.7 56.4 488 HMFEv (GF(31),2,55,21) 583.9 38.0 649 HMFEv (GF(256),3,31,26) 659.4 65.3 952

  • A. Petzoldt

HMFEv PQCrypto 2017 18 / 23

slide-19
SLIDE 19

Comparison with HFEv-/Gui

Major advantages: fewer equations and variables in the public key ⇒ smaller key sizes larger internal state ⇒ no ”double-signing” needed ⇒ Easier to implement, greater efficiency larger field size ⇒ easier to scale to higher levels of security

  • A. Petzoldt

HMFEv PQCrypto 2017 19 / 23

slide-20
SLIDE 20

Implementation and Efficiency

Central step in signature generation: Inversion of FV Two steps:

1 Gr¨

  • bner Basis Step: Find a univariate polynomial p : E → E in the

ideal f (1)

V , . . . , f (k) V .

k small ⇒ can be performed efficiently by a specially designed algorithm

2 Solving Step: Solve the univariate polynomial p by Berlekamps

algorithm

  • A. Petzoldt

HMFEv PQCrypto 2017 20 / 23

slide-21
SLIDE 21

Efficiency

quantum security

  • sign. gen.

verification level (bit) time (ms) time (ms) 62 Gui (GF(2),96,5,6,6) 0.07 0.02 Gui(GF(2),95,9,5,5) 0.18 0.02 Gui(GF(2),94,17,4,4) 0.73 0.02 80 HMFEv (GF(31),2,18,8) 0.131 0.0085 HMFEv (GF(256),3,9,12) 0.261 0.0236 83 Gui(127,9,4,6,2) 0.28 0.015 128 HMFEv (GF(31),2,28,12) 0.26 0.0259 HMFEv (GF(256),3,15,16) 0.443 0.063

  • A. Petzoldt

HMFEv PQCrypto 2017 21 / 23

slide-22
SLIDE 22

Conclusion

Proposal of a new efficient multivariate signature scheme of the HFEv- type which can be defined over large fields ⇒ reduces the number of equations and variables ⇒ smaller key sizes ⇒ improves scalability to higher levels of security resists all known attacks against MPKCs is very efficient ⇒ HMFEv is a promising candidate for the upcoming standardization process of post-quantum signature schemes

  • A. Petzoldt

HMFEv PQCrypto 2017 22 / 23

slide-23
SLIDE 23

The End Thank you for your attention Questions?

  • A. Petzoldt

HMFEv PQCrypto 2017 23 / 23