Lattice-based Signcryption without Random Oracles
๐๐ข๐ฃ๐จ๐ก๐ฉ ๐๐๐ฎ๐ฉ Junji Shikata
Graduate School of Environment and Information Sciences, Yokohama National University, Japan
Lattice-based Signcryption without Random Oracles - - PowerPoint PPT Presentation
Lattice-based Signcryption without Random Oracles Junji Shikata Graduate School of Environment and Information Sciences, Yokohama National University, Japan Overview Lattice-based Cryptography
Graduate School of Environment and Information Sciences, Yokohama National University, Japan
quantum-resistance.
cryptosystems.
encryption (PKE) and digital signatures (DSs)
with data encapsulation mechanism (DEM)
2 + โฏ + ๐ค๐ 2
๐ฟ:
(LWE and SIS) โ It is possible to reduce from lattice problems to these problems. โ The average-case problems are at least as hard as the worst-case problems. โ It is possible to realize a lot of cryptosystems such as fully homomorphic encryption, attribute-based encryption, searchable encryption and so on.
๐ and a Gaussian distribution ๐ with the center
0 and the standard deviation ๐ฝ๐
๐ ร โค๐,
where ๐๐ = ๐โค๐๐ + ๐๐, ๐๐ ี
๐ โค๐ ๐, ๐๐ ี ๐ for ๐ โ {1, โฆ , ๐}
๐ ร โค๐,
๐ ร โค๐
(*) Let ๐ฉ โ ๐1, โฆ , ๐๐ and ๐โค โ ๐1, โฆ , ๐๐ , then the LWE samples can be expressed by ๐ = ๐โค๐ฉ + ๐โค mod ๐
๐ร๐,
โค ๐พ
(both of confidentiality and integrity).
as the Internet
Message
Receiverโs Public-Key Senderโs Secret-Key Senderโs Public-Key Receiverโs Secret-Key Ciphertext
Sender Receiver
invalid
[Z97] Y. Zheng, โDigital Signcryption or how to achieve cost(signature & encryption) << cost(signature) + cost(encryption),โ CRYPTO 1997.
We consider IND-CCA and sUF-CMA security against insiders in the multi-user setting (MU-IND-iCCA and MU-sUF-iCMA).
user setting.
Mutli-User setting Two-User setting
Outsider Insider
[ADR02] J. H. An, Y. Dodis, and T. Rabin, โOn the security of joint signature and encryption,โ EUROCRYPT 2002.
To construct a lattice-based signcryption scheme
sizes and ciphertext-size
1. A direct construction based on lattice problems 2. Hybrid encryption variant of signcryption (hybrid signcryption)
DEM.
iCCA and MU-sUF-iCMA.
Setup phase๏ผ ๐๐ ๐ ี Setup(1๐) Key-Generation: (๐๐๐, ๐ก๐๐) ี KeyGen๐(๐๐ ๐) Key-Generation: (๐๐๐, ๐ก๐๐) ี KeyGen๐(๐๐ ๐) Signcrypt: ๐ท ี SC (๐๐๐, ๐ก๐๐, ๐) Unsigncrypt: ๐/โฅี USC (๐๐๐, ๐ก๐๐, ๐ท)
๐: Security parameter, ๐๐ ๐: Public parameter, ๐๐๐: Senderโs public key, ๐๐๐: Receiverโs public key, ๐ก๐๐: Senderโs secret key, ๐ก๐๐: Receiverโs secret key, ๐: Message, ๐ท: Ciphertext โฅ: Invalid
Sender Receiver
In the following game, if any adversary ๐ตโฒs advatage ๐ต๐๐ค๐ต
MUโINDโiCCA(๐) โ | Pr ๐โฒ = ๐ โ 1 2 | < negl ๐ holds,
Signcryption meets MU-IND-iCCA security.
Challenger Adversary ๐ต ๐0, ๐1, ๐๐๐
โ, ๐ก๐๐ โ
๐ ี
๐ {0,1}
๐ทโ ี SC(๐๐๐, ๐ก๐๐
โ, ๐๐)
๐ทโ ๐โฒ ๐๐๐(โ ๐๐๐
โ),
๐ท(โ ๐ทโ) ๐ Unsigncrypt Oracle ๐โฒ โ {0,1} ๐โฒ ? = ๐ ๐๐ ๐ ี Setup(1๐) ๐๐๐, ๐ก๐๐ ี KeyGen๐ (๐๐ ๐)
MU-IND-iCCA=Multi-User Indistinguishability against insider Chosen Ciphertext Attack
In the following game, if any adversary ๐ตโs advantage ๐ต๐๐ค๐ต
MUโsUFโiCMA ๐ โ Pr ๐ต wins < negl(๐) holds,
Signcryption meets MU-sUF-iCMA security.
Challenger Adversary ๐ต ๐๐ ๐, ๐๐๐ ๐๐ ๐ ี Setup(1๐) ๐๐๐, ๐ก๐๐ ี KeyGen๐ (๐๐ ๐) ๐๐๐
โ, ๐ก๐๐ โ, ๐ทโ
๐(๐), ๐๐๐
(๐)
๐ท(๐) Signcrypt Oracle [๐ต wins]: USC ๐๐ ๐, ๐๐๐, ๐ก๐๐
โ, ๐ทโ = ๐โ โง
โ๐ โ 1, โฆ , ๐ , ๐๐๐
โ, ๐โ, ๐ทโ โ ๐๐๐ ๐ , ๐ ๐ , ๐ท(๐)
๐ queries
MU-sUF-iCMA=Multi-User strong Unforgeability against insider Chosen Message Attack
Tag-based Trapdoor Function [MP12] Digital Signature (sUF-naCMA) [MP12]
+
Direct Construction
Unforgeability MU-sUF-iCMA
+
Signcryption Confidentiality MU-IND-iCCA
Collision-Resistant Hash Function [MR07]
+
Based on LWE Based on SIS [MP12] D. Micciancio, C. Peikert: โTrapdoor for lattices: Simpler, tighter, faster, smaller,โ EUROCRYPT 2012. [MR07] D. Micciancio, O. Regev: โWorst-case to average-case reductions based on gaussian measures,โ SIAM J. Comput. 2007.
Adversary
๐, ๐๐๐ ๐ท
Signcrypt Oracle
Dec ๐ก๐๐, ๐ โ ๐||๐ Enc ๐๐๐, (๐||๐); ๐ โ โ ๐ทโ A valid forgery (๐๐๐, ๐ก๐๐, ๐ทโ) in the MU-sUF-iCMA game Sign ๐ก๐๐, ๐ โ ๐ Enc ๐๐๐, (๐||๐); ๐ โ ๐ท where ๐ is a random number
In the MU-sUF-iCMA game, inside adversaries can generate forgeries as follows: 1. Submit a query to the signcrypt oracle and receive the response, 2. Decrypt the message/signature-pair (๐, ๐) by using ๐ก๐๐, 3. Encrypt (๐, ๐) again and output a forgery ๐ทโ.
Our Idea to solve the problem: Generate a signature on injective tag-based trapdoor functions (TDFs) of LWE ๐๐ต ๐ข๐๐, ๐ก; ๐ฆ = ๐กโค๐ต๐ข๐๐ + ๐ฆโค โ โค๐
๐ [MP12]
าง ๐ = ๐๐ต(๐ข๐๐, ๐ก; ๐ฆ)
๐
๐ถ(๐๐๐, ๐ )
๐ข๐๐
๐: Message ๐ก, ๐ฆ: The input of LWE-based TDFs ๐ : Random value ๐
๐ถ(โ ): Lattice-based collision-resistant
hash function (with a parameter ๐ถ) Overview of SC algorithm
๐๐ ๐ ี ๐๐๐ข๐ฃ๐ 1๐ :
๐ = ๐ ๐log ๐
๐ + ๐ log ๐
๐ร๐
๐ร๐
๐๐ ๐ = (๐, ๐, เดฅ ๐, ๐, ๐ฝ, ๐, โ, ๐, ๐ป, ๐ต1, โฆ , ๐ต๐ log ๐ ,๐ถ)
๐๐๐, ๐ก๐๐ ี ๐ฟ๐๐ง๐ป๐๐๐ ๐๐ ๐
1. าง ๐ต๐ ี โค๐
๐ร๐,
2. ๐๐ ี ๐ธ๐
เดฅ ๐ร๐โlog ๐โ
3. ๐ต๐ = [๐ต๐ โฃ โ๐ต๐ โ ๐๐] 4. Output ๐๐๐ = ๐ต๐, ๐ก๐๐ = ๐๐
๐๐๐, ๐ก๐๐ ี ๐ฟ๐๐ง๐ป๐๐๐(๐๐ ๐)
1. าง ๐ต๐ ี โค๐
๐ร๐,
2. ๐
๐ ี ๐ธ๐ เดฅ ๐ร๐โlog ๐โ
3. ๐ต๐ = [๐ต๐ โฃ ๐ป โ ๐ต๐ โ ๐
๐]
4. Output ๐๐๐ = ๐ต๐, ๐ก๐๐ = ๐
๐
1. ๐
๐, ๐ ๐ก ี ๐ธ๐ log ๐ ๐
, 2. ๐ข = ๐๐ต๐ ๐๐๐ก + ๐
๐ถ ๐ ๐ โ โค๐ ๐,
3. ๐ต๐ = [๐ต๐ โฃ ๐ผ ๐ข ๐ป โ ๐ต๐ โ ๐๐] 4. ๐ก ี โค๐
๐, ๐ฆ0 ี ๐ธ๐ฝ๐ ๐ , ๐ฆ1 ี ๐ธ๐ฝ๐ โ ,
5. เดฅ ๐0 = ๐กโค๐ต๐,๐ข + ๐๐ฆ0
โค โ โค๐ ๐,
6. เดฅ ๐1 = ๐กโค๐ + ๐๐ฆ1
โค โ โค๐ โ
7. าง ๐ท = ( เดฅ ๐0, เดฅ ๐1, ๐
๐),
8. Generate a signature on ๐ โฅ ๐๐๐ โฅ าง ๐ท,
๐ต๐ ๐ โฅ ๐๐๐ โฅ
าง ๐ท + ๐
๐ถ ๐ ๐ก โ โค๐ ๐,
๐ต๐ ๐ต0 + โ๐=1
๐โlog ๐โ โ๐ โ ๐ต๐ ,
๐, ๐ต๐,โ, ๐ฃ๐, ๐ ,
๐ก) is the signature,
9. ๐0 = เดฅ ๐0 + ๐
๐ก โ โค๐ ๐, ๐1 = เดฅ
๐1 + ๐ โ ๐
๐ 2 โ โค๐ โ
๐, ๐)
1. ๐ข = ๐๐ต๐ ๐๐๐ + ๐
๐ถ ๐ ๐ โ โค๐ ๐,
2. ๐จ, ๐
๐ก ี ๐ฝ๐๐ค๐๐ ๐ข ๐๐, ๐ต๐,๐ข, ๐0 ,
3. ๐น ี ๐๐๐๐๐๐ ๐๐, ๐ต๐,๐ข, ๐, ๐ , 4. ๐คโค = ๐1
โค โ ๐0 โค๐น = ๐ แ
แ ๐ฆ1
โค +
๐
๐ 2 โ ๐ฆ0 โค๐น ,
5. Recover ๐ from ๐ค/๐ 6. Output ๐ if ๐ต๐,โ โ ๐ = ๐ฃ๐ mod ๐ and ๐ โค ๐ ๐ + ๐โlog ๐โ , or
where
๐0: = ๐0 โ ๐
๐ก, เดฅ
๐1: = ๐1 โ ๐ โ ๐
๐ 2 , าง
๐ท: = เดฅ ๐0, เดฅ ๐1, ๐
๐ ,
าง ๐ท + ๐
๐ถ(๐ ๐ก),
โ๐log ๐โ ๐ต๐],
1. ๐ฟ ี 0,1 โ,๐
๐, ๐ ๐ก ี ๐ธ๐ log ๐ ๐
, 2. ๐ข = ๐๐ต๐ ๐๐๐ก + ๐
๐ถ ๐ ๐ โ โค๐ ๐,
3. ๐ต๐ = [๐ต๐ โฃ ๐ผ ๐ข ๐ป โ ๐ต๐ โ ๐๐] 4. ๐ก ี โค๐
๐, ๐ฆ0 ี ๐ธ๐ฝ๐ ๐ , ๐ฆ1 ี ๐ธ๐ฝ๐ โ ,
5. เดฅ ๐0 = ๐กโค๐ต๐,๐ข + ๐๐ฆ0
โค โ โค๐ ๐,
6. เดฅ ๐1 = ๐กโค๐ + ๐๐ฆ1
โค โ โค๐ โ
7. าง ๐ท = ( เดฅ ๐0, เดฅ ๐1, ๐
๐),
8. Generate a signature on ๐ โฅ ๐๐๐ โฅ าง ๐ท โฅ ๐ฟ,
๐ต๐ ๐ โฅ ๐๐๐ โฅ
าง ๐ท โฅ ๐ฟ + ๐
๐ถ ๐ ๐ก โ
โค๐
๐,
๐ต๐ ๐ต0 + โ๐=1
๐โlog ๐โ โ๐ โ ๐ต๐ ,
๐, ๐ต๐,โ, ๐ฃ๐, ๐ ,
๐ก) is the signature,
9. ๐0 = เดฅ ๐0 + ๐
๐ก โ โค๐ ๐,
๐1 = เดฅ ๐1 + ๐ โ ๐ฟ ๐ 2 โ โค๐
โ,
10. ๐2 = ๐ธ๐น๐. ๐น๐๐(๐ฟ, ๐),
๐, ๐)
๐๐๐ข๐ฃ๐, ๐ฟ๐๐ง๐ป๐๐๐, ๐ฟ๐๐ง๐ป๐๐๐, ๐๐๐ท are almost the same as those of the lattice-based construction.
(*) one-to-one property: DEM is one-to-one if for any message ๐ and any key ๐ฟ, there is only one ciphertext ๐ such that ๐ = ๐ธ๐น๐. ๐ธ๐๐(๐ฟ, ๐).
Construction Primitive ๐๐ท๐๐ฟ [CMSM11]
๐๐ท๐ฟ๐น๐ [CMSM11]
๐๐ท๐ท๐ผ๐ฟ [NS13]
Our Construction ๐ผ๐๐ท
To compare lattice-based schemes fairly, we compare our hybrid Signcryption (HSC) scheme with others, because other constructions [CMSM11] are based on the KEM/DEM framework.
Existing Construction Applied Constructions of Primitives ๐๐ท๐๐ฟ [CMSM11]
๐๐ท๐ฟ๐น๐ [CMSM11]
๐๐ท๐ท๐ผ๐ฟ [NS13]
[ABB10] S. Agrawal, D. Boneh, X. Boyen, โEfficient lattice (H)IBE in the standard model,โ EUROCRYPT 2010. [B10] X. Boyen, โLattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more,โ PKC 2010. [CHKP12] D. Cash, D. Hofheinz, E. Kiltz, C. Peikert: โBonsai trees, or how to delegate a lattice basis,โ J. Cryptology 2012. [LM08] V. Lyubashevsky, D. Micciancio, โAsymptotically efficient lattice-based digital signatures,โ TCC 2008.
Construction Receiverโs key size Senderโs key size Ciphertext size Public key Secret key Public key Secret key ๐๐ท๐๐ฟ 3๐๐ log ๐ + ๐๐ฟ log ๐ ๐๐log ๐ log ๐ 3๐๐ log ๐ ๐๐log ๐ log ๐ ๐ + ๐ฟ log ๐ + 3๐ log ๐ + โ ๐๐ท๐ฟ๐น๐ 2๐๐ log ๐ + ๐๐ฟ log ๐ 2๐ + ๐ฟ log ๐ + 2๐ log ๐ + 2๐log ๐ + โ ๐๐ท๐ท๐ผ๐ฟ ๐๐ log ๐ + ๐๐ฟ log ๐ (Best) ๐๐ log ๐ (Best) 2๐ + ๐ฟ log ๐ + ๐ log ๐ + โ + |๐ค๐| Our Const. ๐ผ๐๐ท ๐ + ๐ฟ log ๐ + 2๐ log ๐ + โ ๐: security parameter, ๐: a large enough prime, |๐|: the bit-length of a message ๐ = ฮฉ(๐log ๐), ๐ฟ: DEMโs symmetric key, ๐ < ๐: a positive integer |๐ค๐|: the bit-lenthg of One-Time Signatureโs verification key size
Comparison of ciphertext Ciphertext-Size (Bit-length) ๐๐ท๐๐ฟ 5.5 ร 105 ๐๐ท๐ฟ๐น๐ 5.2 ร 105 ๐๐ท๐ท๐ผ๐ฟ 45.3 ร 105 Our Const. ๐ผ๐๐ท 4.0 ร 105 (Best) Parameters Size [bits] ๐ 256 ๐ 4093 ๐ 9215 ๐ฟ 512 ๐ 49148 ๐ค๐ โ ๐2log2 ๐ 42.0 ร 105
[ACF+15] M.R. Albrecht, C. Cid, J. Faug ฦฐ ere, R. Fitzpatrick, L. Perret: โOn the complexity of the BKW algorithm on LWE,โ Des. Codes Cryptography 2015. [LP11] R. Lindner, C. Peikert: โBetter ey sizes (and attacks) for LWE-based encryption,โ CT-RSA 2011.
Note: We can observe that our construction is best, even if we apply other parameters in [ACF+15].