k -times Full Traceable Ring Signature Xavier Bultel Pascal - - PowerPoint PPT Presentation

k times full traceable ring signature
SMART_READER_LITE
LIVE PREVIEW

k -times Full Traceable Ring Signature Xavier Bultel Pascal - - PowerPoint PPT Presentation

k -times Full Traceable Ring Signature Xavier Bultel Pascal Lafourcade 31 August 2016, P . Lafourcade (Univ Clermont Auvergne) k -times Full Traceable Ring Signature 31/08/2016 1 / 26 Signature P . Lafourcade (Univ Clermont Auvergne) k


slide-1
SLIDE 1

k-times Full Traceable Ring Signature

Xavier Bultel Pascal Lafourcade 31 August 2016,

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 1 / 26

slide-2
SLIDE 2

Signature

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 2 / 26

slide-3
SLIDE 3

Signature

Signature Secrete key Public key Verification

Clef privée

Clef publique

1977, RSA: md mod n

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 2 / 26

slide-4
SLIDE 4

Ring Signature (Rivest et al., 2001)

Alice (m1, σ1) (m2, σ2) (m3, σ3) Bob (m4, σ4) Carol (m5, σ5) (m6, σ6) David (m7, σ7) Observer σ1, σ2, σ3, σ4, σ5, σ6 and σ7 come from Alice or Bob or Carol or David → Anonymous signatures

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 3 / 26

slide-5
SLIDE 5

Linkable Signature (Liu et al., 2004)

Alice (m1, σ1) (m2, σ2) (m3, σ3) Bob (m4, σ4) Carol (m5, σ5) (m6, σ6) David (m7, σ7) Observer σ1, σ2 and σ3 come from the same user σ5 and σ6 come from the same user No information about σ4 and σ7 signer → Anonymous but Linkable

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 4 / 26

slide-6
SLIDE 6

1-time Traceable Sig. (Canard et al., 2006)

Alice (m1, σ1) (m2, σ2) (m3, σ3) Bob (m4, σ4) Carol (m5, σ5) (m6, σ6) David (m7, σ7) Observer σ1, σ2 and σ3 comes from Alice σ5 and σ6 comes from Carol σ4 and σ7 are anonymous → Only 1 anonymous signature per group member

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 5 / 26

slide-7
SLIDE 7

2-times Traceable Sig. (Au et al., 2006)

Alice (m1, σ1) (m2, σ2) (m3, σ3) Bob (m4, σ4) Carol (m5, σ5) (m6, σ6) David (m7, σ7) Observer σ1 and σ3 comes from Alice σ2, σ4, σ5, σ6 and σ7 are anonymous → Only 2 anonymous signature

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 6 / 26

slide-8
SLIDE 8

2-times Traceable Sig. (Au et al., 2006)

Alice (m1, σ1) (m2, σ2) (m3, σ3) Bob (m4, σ4) Carol (m5, σ5) (m6, σ6) David (m7, σ7) Observer σ1 and σ3 comes from Alice σ2 , σ4, σ5, σ6 and σ7 are anonymous → Only 2 anonymous signature σ2 is anonymous → not full traceable

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 6 / 26

slide-9
SLIDE 9

Our contribution: k-times Full Traceable Sig.

Alice (m1, σ1) (m2, σ2) (m3, σ3) Bob (m4, σ4) Carol (m5, σ5) (m6, σ6) David (m7, σ7) Observer σ1, σ2 and σ3 comes from Alice σ4, σ5, σ6 and σ7 are anonymous

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 7 / 26

slide-10
SLIDE 10

Our contribution: k-times Full Traceable Sig.

Alice (m1, σ1) (m2, σ2) (m3, σ3) Bob (m4, σ4) Carol (m5, σ5) (m6, σ6) David (m7, σ7) Observer σ1, σ2 and σ3 comes from Alice σ4, σ5, σ6 and σ7 are anonymous → k anonymous signature per users → Trace all cheater’s signatures

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 7 / 26

slide-11
SLIDE 11

Our contributions

k-times Full Traceable Signature

Generalize traceable signatures Ring signature (ad-hoc group) Event oriented Fine-grained k Anonymous (less than k) Full public linkability (more than k) Full public traceability (more than k) Applications:

1

proxy voting

2

k-times veto

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 8 / 26

slide-12
SLIDE 12

Application in k-times Veto for CARS’16

Alice Bob Carol David

Conference on Anonymous Ring Signatures

List of candidates for the Program Commitee (PC): Albert, Bernard, Cedric, Donald, Edward, Fabien, Gaston, Hercul, Ivan, Jim, Karl Each member of Steering Commitee (SC) can exclude k names of the list Vetos are anonymous Members who exceed this limitation are excluded and their vetos are discarded

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 9 / 26

slide-13
SLIDE 13

Application: k-times Veto

PC= Albert, Bernard, Cedric, Donald, Edward, Fabien, Gaston, Hercul, Ivan, Jim, Karl Veto using 2-times traceable signature: Alice (Donald, σ(Donald)) (Jim, σ(Jim)) (Edward, σ(Edward)) Bob (Edward, σ(Edward)) Carol (Albert, σ(Albert)) (Gaston, σ(Gaston)) David (Gaston, σ(Gaston))

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 10 / 26

slide-14
SLIDE 14

Application: k-times Veto

PC= Albert, Bernard, Cedric, Donald, Edward, Fabien, Gaston, Hercul, Ivan, Jim, Karl Veto using 2-times traceable signature: Alice (Donald, σ(Donald)) (Jim, σ(Jim)) (Edward, σ(Edward)) Bob (Edward, σ(Edward)) Carol (Albert, σ(Albert)) (Gaston, σ(Gaston)) David (Gaston, σ(Gaston))

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 10 / 26

slide-15
SLIDE 15

Application: k-times Veto

PC= Albert, Bernard, Cedric, Donald, Edward, Fabien, Gaston, Hercul, Ivan, Jim, Karl Veto using 2-times full traceable signature: Alice (Donald, σ(Donald)) (Jim, σ(Jim)) (Edward, σ(Edward)) Bob (Edward, σ(Edward)) Carol (Albert, σ(Albert)) (Gaston, σ(Gaston)) David (Gaston, σ(Gaston))

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 10 / 26

slide-16
SLIDE 16

Outline

1

Introduction

2

Definitions k-FTRS Security Notions

3

Our Scheme

4

Conclusion

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 11 / 26

slide-17
SLIDE 17

Outline

1

Introduction

2

Definitions k-FTRS Security Notions

3

Our Scheme

4

Conclusion

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 12 / 26

slide-18
SLIDE 18

Formal Definition

L, L1 and L2 are sets of public keys (identities) of users’ ring

Definition (k-FTRS)

Init(1t): output init Gen(init, k): output a signing key pair (ssk, svk) SigE(ssk, m, L, j): output a signature σ VerE(L, σ, m): check that σ is valid LinkE(L1, L2, σ1, σ2, m1, m2): test link between σ1 and σ2 MatchE(L1, L2, σ1, σ2, m1, m2): output svku and a tracer ω(E,u) TraceE(L, σ, m, ω(E,u)): check whether σ comes from the user u.

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 13 / 26

slide-19
SLIDE 19

Example (2-times)

Alice (m1, σ1) (m2, σ2) (m3, σ3) Bob (m4, σ4) Carol (m5, σ5) (m6, σ6) David (m7, σ7) Observer

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 14 / 26

slide-20
SLIDE 20

Example (2-times)

Alice (m1, σ1) (m2, σ2) (m3, σ3) Bob (m4, σ4) Carol (m5, σ5) (m6, σ6) David (m7, σ7) Observer Detect cheaters: link on all pairs (σi, σj) → Link σ1 and σ3

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 14 / 26

slide-21
SLIDE 21

Example (2-times)

Alice (m1, σ1) (m2, σ2) (m3, σ3) Bob (m4, σ4) Carol (m5, σ5) (m6, σ6) David (m7, σ7) Observer Detect cheaters: link on all pairs (σi, σj) → Link σ1 and σ3 Identify cheater: match on σ1 and σ3 → svkalice and tracer ω

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 14 / 26

slide-22
SLIDE 22

Example (2-times)

Alice (m1, σ1) (m2, σ2) (m3, σ3) Bob (m4, σ4) Carol (m5, σ5) (m6, σ6) David (m7, σ7) Observer Detect cheaters: link on all pairs (σi, σj) → Link σ1 and σ3 Identify cheater: match on σ1 and σ3 → svkalice and tracer ω Remove signature: trace using ω on all σ → Trace and remove σ2

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 14 / 26

slide-23
SLIDE 23

Security

Definition (Unforgeability)

It is infeasible to forge a signature without the key Signature oracle

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 15 / 26

slide-24
SLIDE 24

Security

Definition (Unforgeability)

It is infeasible to forge a signature without the key Signature oracle

Definition (Anonymity)

It is infeasible to guess the identity of a signer from less than k signatures Signature oracle (with inherent restrictions)

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 15 / 26

slide-25
SLIDE 25

Security

Definition (Unforgeability)

It is infeasible to forge a signature without the key Signature oracle

Definition (Anonymity)

It is infeasible to guess the identity of a signer from less than k signatures Signature oracle (with inherent restrictions)

Definition (Traceability)

More than k signatures are always traceable Signature oracle

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 15 / 26

slide-26
SLIDE 26

Outline

1

Introduction

2

Definitions k-FTRS Security Notions

3

Our Scheme

4

Conclusion

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 16 / 26

slide-27
SLIDE 27

Idea of Construction

Inspired of Canard et al. (1-time traceable) ZKP of correctness of the signature Identity is "encrypted" in signatures Match algorithm outputs a key (tracer) that allows to decrypt identity

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 17 / 26

slide-28
SLIDE 28

Cryptographic Assumptions

Bilinear pairing e : G1 × G2 → Gt in (p, G1, G2, Gt, g1, g2): e(ga

1, gb 2) = e(g1, g2)ab

DDH assumption:

◮ Instance: ga

1, gb 1 and gz 1

◮ Problem: z = ab or not?

BDDH assumption:

◮ Instance: ga

1, gb 1, gc 2 and e(g1, g2)z

◮ Problem: z = abc or not?

2BDDH assumption:

◮ Instance: ga

1, gb 1, gc 2, gd 2 , e(g1, g2)abc and e(g1, g2)z

◮ Problem: z = abd or not? P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 18 / 26

slide-29
SLIDE 29

Signature Construction (i-times) with i = 2

Secret key: x1, x2 and x Public key: gx1

1 , gx2 1 and gx 1

Event: E ∈ {0, 1}∗; H0 and H1 two hash functions

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 19 / 26

slide-30
SLIDE 30

Signature Construction (i-times) with i = 2

Secret key: x1, x2 and x Public key: gx1

1 , gx2 1 and gx 1

Event: E ∈ {0, 1}∗; H0 and H1 two hash functions The signer picks i

$

← {1, 2}, r

$

← Z∗

p and computes:

A = H0(E, 0) B = H0(E, 1) C = H0(E, 2) W = H0(E, 3) u = H1(E, m, 0, gr

2)

v = H1(E, m, 1, gr

2)

Then he computes the signature σ = (T1, T2, T3, T4, T5, T6): T1 = Axi T2 = Bxi · g1

x·u

T3 = Cxi · W v·x T4 = gr

2

T5 = e(W, T4)x T6 = ZKP of correctness of σ

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 19 / 26

slide-31
SLIDE 31

Signature Construction (2-times)

Secret key: x1, x2 and x Public key: gx1

1 , gx2 1 and gx 1

σ = (T1, T2, T3, T4, T5, T6) T1 = Axi T2 = Bxi · g1

x·u

T3 = Cxi · W v·x T4 = gr

2

T5 = e(W, T4)x T6 = ZKP of correctness of σ Unforgeability: Validity of ZKP: Without (x1, x2, x), impossible to forge T6

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 20 / 26

slide-32
SLIDE 32

Signature Construction (2-times)

Secret key: x1, x2 and x Public key: gx1

1 , gx2 1 and gx 1

T1 = Axi T2 = Bxi · g1

x·u

T3 = Cxi · W v·x T4 = gr

2

T5 = e(W, T4)x T6 = ZKP of correctness of σ Anonymity: T1: DDH with (A, gxi

1 , Axi)

T2: DDH with (B, gxi

1 , Bxi)

T3: DDH with (C, gxi

1 , Cxi)

T5: BDDH with (W, T4, gx, e(W, T4)x) T6: zero-knowlege

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 21 / 26

slide-33
SLIDE 33

Signature Construction (2-times)

Secret key: x1, x2 and x; Public key: gx1

1 , gx2 1 and gx 1

T (i = 1) T ′ (i = 2) T ′′ (i = 1) T1 = Ax1 T ′

1 = Ax2

T ′′

1 = Ax1

T2 = Bx1 · g1x·u T ′

2 = Bx2 · g1x·u′

T ′′

2 = Bx1 · g1x·u′′

T3 = Cx1 · W v·x T ′

3 = Cx2 · W v′·x

T ′′

3 = Cx1 · W v′′·x

T4 = gr

2

T ′

4 = gr ′ 2

T ′′

4 = gr ′′ 2

T5 = e(W, T4)x T ′

5 = e(W, T ′ 4)x

T ′′

5 = e(W, T ′′ 4 )x

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 22 / 26

slide-34
SLIDE 34

Signature Construction (2-times)

Secret key: x1, x2 and x; Public key: gx1

1 , gx2 1 and gx 1

T (i = 1) T ′ (i = 2) T ′′ (i = 1) T1 = Ax1 T ′

1 = Ax2

T ′′

1 = Ax1

T2 = Bx1 · g1x·u T ′

2 = Bx2 · g1x·u′

T ′′

2 = Bx1 · g1x·u′′

T3 = Cx1 · W v·x T ′

3 = Cx2 · W v′·x

T ′′

3 = Cx1 · W v′′·x

T4 = gr

2

T ′

4 = gr ′ 2

T ′′

4 = gr ′′ 2

T5 = e(W, T4)x T ′

5 = e(W, T ′ 4)x

T ′′

5 = e(W, T ′′ 4 )x

LINK: T and T ′′ are linkable: check that T1 = T ′′

1

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 22 / 26

slide-35
SLIDE 35

Signature Construction (2-times)

Secret key: x1, x2 and x; Public key: gx1

1 , gx2 1 and gx 1

T (i = 1) T ′ (i = 2) T ′′ (i = 1) T1 = Ax1 T ′

1 = Ax2

T ′′

1 = Ax1

T2 = Bx1 · g1x·u T ′

2 = Bx2 · g1x·u′

T ′′

2 = Bx1 · g1x·u′′

T3 = Cx1 · W v·x T ′

3 = Cx2 · W v′·x

T ′′

3 = Cx1 · W v′′·x

T4 = gr

2

T ′

4 = gr ′ 2

T ′′

4 = gr ′′ 2

T5 = e(W, T4)x T ′

5 = e(W, T ′ 4)x

T ′′

5 = e(W, T ′′ 4 )x

MATCH: T and T ′′ T2 T ′′

2

  • 1

u−u′′

= Bx1 · gx·u

1

Bx1 · gx·u′′

1

  • 1

u−u′′

= gx

1;

T3 T ′′

3

  • 1

v−v′′

= W x = ω

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 22 / 26

slide-36
SLIDE 36

Signature Construction (2-times)

Secret key: x1, x2 and x; Public key: gx1

1 , gx2 1 and gx 1

T (i = 1) T ′ (i = 2) T ′′ (i = 1) T1 = Ax1 T ′

1 = Ax2

T ′′

1 = Ax1

T2 = Bx1 · g1x·u T ′

2 = Bx2 · g1x·u′

T ′′

2 = Bx1 · g1x·u′′

T3 = Cx1 · W v·x T ′

3 = Cx2 · W v′·x

T ′′

3 = Cx1 · W v′′·x

T4 = gr

2

T ′

4 = gr ′ 2

T ′′

4 = gr ′′ 2

T5 = e(W, T4)x T ′

5 = e(W, T ′ 4)x

T ′′

5 = e(W, T ′′ 4 )x

TRACE: T using the tracer ω = W x, check that: e(ω, T ′

4) = T ′ 5

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 22 / 26

slide-37
SLIDE 37

Signature Construction (2-times)

Secret key: x1, x2 and x; Public key: gx1

1 , gx2 1 and gx 1

T (i = 1) T ′ (i = 2) T ′′ (i = 1) T1 = Ax1 T ′

1 = Ax2

T ′′

1 = Ax1

T2 = Bx1 · g1x·u T ′

2 = Bx2 · g1x·u′

T ′′

2 = Bx1 · g1x·u′′

T3 = Cx1 · W v·x T ′

3 = Cx2 · W v′·x

T ′′

3 = Cx1 · W v′′·x

T4 = gr

2

T ′

4 = gr ′ 2

T ′′

4 = gr ′′ 2

T5 = e(W, T4)x T ′

5 = e(W, T ′ 4)x

T ′′

5 = e(W, T ′′ 4 )x

Traceability: If signatures are well formed, link, match and trace work → Validity of the ZKP of correctness

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 22 / 26

slide-38
SLIDE 38

Security Analysis

Theorem

Our k-FTRS scheme is unforgeable, traceable and anonymous under the DDH assumption in G1 and the 2BDDH assumption in the random oracle model

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 23 / 26

slide-39
SLIDE 39

Outline

1

Introduction

2

Definitions k-FTRS Security Notions

3

Our Scheme

4

Conclusion

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 24 / 26

slide-40
SLIDE 40

Conclusion

Comparaison: Schemes

  • Sig. size

Ad-hoc Times Trac. Full trac. Ring signature O(n) Yes ∞

  • Short group sig.

O(1) No ∞

  • Linkable sig.

O(n) Yes 1 No

  • List sig. (Ad-hoc)

O(n) Yes 1 Yes

  • k-times group sig.

O(1) No k Yes No Ktrace O(n · k) Yes k Yes Yes

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 25 / 26

slide-41
SLIDE 41

Conclusion

Comparaison: Schemes

  • Sig. size

Ad-hoc Times Trac. Full trac. Ring signature O(n) Yes ∞

  • Short group sig.

O(1) No ∞

  • Linkable sig.

O(n) Yes 1 No

  • List sig. (Ad-hoc)

O(n) Yes 1 Yes

  • k-times group sig.

O(1) No k Yes No Ktrace O(n · k) Yes k Yes Yes Future works: Short signature size Full traceable group signatures Without random oracle Without pairing

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 25 / 26

slide-42
SLIDE 42

Thank you for your attention! questions?

P . Lafourcade (Univ Clermont Auvergne) k-times Full Traceable Ring Signature 31/08/2016 26 / 26